Network Working Group                                             B. Liu
Internet-Draft                                       Huawei Technologies
Intended status: Informational                              B. Carpenter
Expires: April 20, 2019                                Univ. of Auckland
                                                        October 17, 2018


                     Roadmap to a Networkless World
                 draft-liu-nmrg-networkless-roadmap-01

Abstract

   This document aims to illustrate possible approaches to make network
   management and operations more autonomic in several aspects.  The
   ultimate goal is that the network could run all by itself, so that
   users and administrators may feel that there is no network to take
   care of at all (a.k.a.  "Networkless").  The approaches are described
   in a form of different levels (inspired by the Self-Driven Car
   levels).  The higher the level is, the more autonomic management
   capabilities the network would have.

   Although some specific technologies are categorized into different
   levels, it is not the document's intent to rank them; rather, this
   document is more about discussing the possible next stage and the
   ultimate vision.  Hopefully, this document could collect people's
   consensus in the industry and provide guidance for future technology
   developments.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 20, 2019.







Liu & Carpenter          Expires April 20, 2019                 [Page 1]


Internet-Draft                 Networkless                  October 2018


Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Level-by-Level approach to Networkless  . . . . . . . . . . .   3
     2.1.  Self-Organization Levels  . . . . . . . . . . . . . . . .   3
     2.2.  Self-Configuration Levels . . . . . . . . . . . . . . . .   4
     2.3.  Self-Optimization and Levels  . . . . . . . . . . . . . .   5
     2.4.  Self-Diagnostic Levels  . . . . . . . . . . . . . . . . .   5
     2.5.  Self-Healing Levels . . . . . . . . . . . . . . . . . . .   6
   3.  Key Capablities to Achieve Networkless  . . . . . . . . . . .   6
     3.1.  Network Perception  . . . . . . . . . . . . . . . . . . .   6
     3.2.  Decision and Reasoning  . . . . . . . . . . . . . . . . .   7
     3.3.  Operation Interface . . . . . . . . . . . . . . . . . . .   7
   4.  Possible next-step technologies . . . . . . . . . . . . . . .   8
     4.1.  Self-Organization . . . . . . . . . . . . . . . . . . . .   8
     4.2.  Self-Configuration  . . . . . . . . . . . . . . . . . . .   9
     4.3.  Self-Optimization . . . . . . . . . . . . . . . . . . . .  11
     4.4.  Self-Diagnostic/Healing . . . . . . . . . . . . . . . . .  11
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   7.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  11
   8.  Informative References  . . . . . . . . . . . . . . . . . . .  12
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   As the network is evolving rapidly, the system is becoming more and
   more complex; thus managing a network is more and more challenging.
   It has been a common feeling in the industry that the operational
   expense of running networks is becoming a vital pain point.  To
   address the management complexity challenges, there are new
   technologies emerging.  For example, Autonomic Networking [RFC7575],
   which is under standardization in IETF Anima working group [Anima],



Liu & Carpenter          Expires April 20, 2019                 [Page 2]


Internet-Draft                 Networkless                  October 2018


   is following an approach to allow the network elements do more
   management related operations by themselves.  SDN techniques have
   significantly improved the efficiency of network service delivery in
   some scenarios.  Network function virtualization, network slicing,
   and the related orchestration techniques are expected to do the same.
   In future, the intent-based network concept, which focuses more on
   the operational simplicity perspective, should allow users or
   administrators to control the network system in a radically simple
   way (that is, driven by abstract intent, rather than by detailed
   configurations).

   This document is not proposing a new technology, rather, it collects
   available tecnologies and illustrates possible future technologies
   and the final effect on network users or administrators.  The
   ultimate goal is that the network could run all by itself, so that
   users oradministrators may feel like there no network to take care of
   at all (a.k.a.  "Networkless").

   In Section 2, network management is divided into several aspects for
   discussion, from an administrator's perspective.  In each aspect
   there are automation and autonomicity levels to illustrate past
   (Level 0), current state of art (Level 1) and possible future
   technologies (Level 2-4).  Section 3 focuses on some common and vital
   capabilities the network system needs to have, in order to support
   the goals described in Section 2.

2.  Level-by-Level approach to Networkless

2.1.  Self-Organization Levels

   Self-organization represents the ability of network elements to
   autonomically connect with each other, form domains, or even decide
   the topology, hierarchy or architecture.

   o  Level 1: LAN auto-connection

      -  E.g. current Ethernets can connected with each other without
         any configurations once the cables are connected.

   o  Level 2: IP auto-routing & NE auto-connection to NMS

      -  IGP and BGP protocols allow the routers to connect with each
         other autonomically, assuming prefixes are assigned to links.

      -  NEs automatically get connected with the NMS, current solutions
         includes DCN [Q: What is DCN?], Anima ACP
         [I-D.ietf-anima-autonomic-control-plane] etc.  [Q: Mention
         Netconf "call home"?]



Liu & Carpenter          Expires April 20, 2019                 [Page 3]


Internet-Draft                 Networkless                  October 2018


   o  Level 3: Network Areas Self-Division and Key NEs election

      -  E.g.  IGP Area self-division; controller election

   o  Level 4: Network Architecture and NE roles Self-identification

      -  E.g. autonomically identify topology characteristics and divide
         network layers; autonomically identify roles such as access
         gateway, aggregation gateway, core gateway etc.

      [Note]  More detailed technical discussion regarding to Level-3
         and Level-4 please refer to Section 4.1 .

   o  Level 5: Self-Construction of Network Topologies

      -  E.g. for wireless network or overlay virtual networks

2.2.  Self-Configuration Levels

   o  Level 1: CLI

      -  remote log-in, do configs one by one

   o  Level 2: NE Configs Auto-delivery

      -  Administrators design detailed configurations of each NE, using
         NMS/Controller automatically deliver the configurations

   o  Level 3/4: NE Configs Auto-Compiling

      -  Administrators design network architecture and solutions, the
         network autonomically compiles detailed NE configurations
         (centrally or in a distributed manner).

      -  All detailed configurations are created by software.

      -  More and more machine-native configurations rather than human
         interfaces.

      [Note]  More detailed technical discussion please refer to
         Section 4.2 .

   o  Level 5: Network Self-Orchestration

      -  Administrators/Apps only input highly abstracted service
         requests (e.g., build a wireless backhaul network), then the
         network would deduce all configurations.




Liu & Carpenter          Expires April 20, 2019                 [Page 4]


Internet-Draft                 Networkless                  October 2018


2.3.  Self-Optimization and Levels

   This sub-section focuses on traffic forwarding performance of the
   network, mainly include path selection and QoS related issues.

   o  Level 1: Static Traffic Engineering

   o  Level 2: Auto Traffic Load Balance

      -  Controller dynamically adjust paths to achieve balanced traffic
         load and congestion, according to specific algorithms;

      -  NE can achieve port-based load balancing locally

   o  Level 3/4: Comprehensive SLA/QoS Self-Optimization

      -  The network autonomically optimizes delay, bandwidth etc.
         according to Administrator's or App's requirements;

      -  The network autonomically achieves measurement according to the
         optimization goal.

   o  Level 5: Autonomous Optimization

      -  The network generates optimization policies by itself, and
         keeps the performance at the best level;

      -  Meanwhile, achieves balance between performance and cost.

2.4.  Self-Diagnostic Levels

   This sub-section focuses on network fault diagnostic.

   o  Level 1: NMS-assisted manual diagnostic

      -  Administrators use tools like ping/tracroute for mannual
         diagnostics

   o  Level 2: Automatic Data Analysis

      -  Software collects data around the whole network, and use data
         mining or machine learning and decision tree to aggregate
         alarms and analyze the cause.

   o  Level 3/4: Precise Fault Location

      -  Precise alarms to report the exact fault events.




Liu & Carpenter          Expires April 20, 2019                 [Page 5]


Internet-Draft                 Networkless                  October 2018


      -  Precise location to reveal the real root cause.

   o  Level 5: Fault Prediction

      -  Network uses current data (e.g. bit error rates, temperature
         alarms) to predict failures.

2.5.  Self-Healing Levels

   o  Level 1: NMS-assisted manual healing

      -  Administrators use NMS to manually recover the configurations
         or do the adjustment.

   o  Level 2: Protocol-based Healing

      -  Fixed healing functions built into NEs, such as BFD, and FRR
         etc.

   o  Level 3: Programmable Healing

      -  Administrators can set specific healing policies based on a set
         of general and abstracted rules of dealing with fault.

      -  Automatic call-out of technician.

   o  Level 4/5: Fault Avoidance

      -  According to the prediction, avoid the fault by backup, adjust
         traffic, early call-out of technician, etc.

3.  Key Capablities to Achieve Networkless

3.1.  Network Perception

   o  Level 1: NE-based Statistics and Probe

      -  E.g.  NE port statistics; end to end probe.  Based on known
         fixed topology.

   o  Level 2: Network Visualization

      -  Telemetry, logs/event analysis etc.

      -  Display current toplogy.

   o  Level 3: Real-time Holographic Network Data




Liu & Carpenter          Expires April 20, 2019                 [Page 6]


Internet-Draft                 Networkless                  October 2018


      -  Network Digital Twin;

      -  NE deeply sense local traffic and fault etc.

   o  Level 4: Network Modeling and Pattern Recognition

      -  Comprehensive modeling for complex network problems;

      -  Pattern recognition to identify current network status

   o  Level 5: Network Event/Traffic Trend Prediction

      -  Based on ML trained on past observation of similar networks.

3.2.  Decision and Reasoning

   o  Level 1: Fixed Control Loops

      -  The control loop functions are embedded in specific protocols/
         modules, such as IGP, DHCP, Anima BRSKI
         [I-D.ietf-anima-bootstrapping-keyinfra] , and Anima ACP
         [I-D.ietf-anima-autonomic-control-plane] etc.

   o  Level 2: Programmable Control Loops

      -  Algorithms (in Controller or Autonomic Service Agent) for
         specific functions and scenarios

      -  might embed some Machine Learning capabilities, or outsource ML
         to a central resource.

   o  Level 3: Machine Learning [Q: Maybe this should be Level 2/3?]

      -  General control loops, driven by specific Intents (e.g.  Intent
         provides the Reward definition of the reinforcement learning)

   o  Level 4: Machine Inference [Q: Maybe this should be Level 4?]

      -  Configuration, optimization, diagnostic, healing policies
         inference

   o  Level 5: (To be filled)

3.3.  Operation Interface

   o  Level 1: CLI





Liu & Carpenter          Expires April 20, 2019                 [Page 7]


Internet-Draft                 Networkless                  October 2018


      -  Manual management oriented interface; batch processing within a
         machine (e.g.  Shell)

   o  Level 2: NE-level Primitive API

      -  Controller oriented NE-level API containing detailed
         configurations.  (E.g.  Openflow, Netconf/YANG)

   o  Level 3: NE-level Declarative API

      -  Orchestrator oriented NE-level declarative API

      -  Orchestrator doesn't need to care about detailed NE specific
         configurations

   o  Level 4: Network-level Declarative API

      -  User/Administrator oriented declarative API, to make the
         network be called as a service.

   o  Level 5: Machine-native Autonomous API

      -  The machines would autonomously construct the content of the
         APIs to fulfill the need of collaboration between modules.

      -  This level would likely be based on ML trained on similar
         networks with similar applications.

4.  Possible next-step technologies

   This section discusses some possible next-steps for the technologies
   described in Section 2.  Basically, the next-steps are Level-3 or
   Level-4 for each aspect.

4.1.  Self-Organization

   Current technologies (such as the Level-2 Self-organization ) can
   decently deal with the problem of how a device can get connected to
   the NOC and then get managed.  After that, it still relies on human
   planning to properly configure the basic network connectivity, such
   as IP addresses, IGP etc.  (This part of basic configurations is
   always called "underlay configurations" comparing to the overlay
   services.)

   Thus, to simplify human work, it is expected that the system can do
   some "planning" work.  Some critical aspects of network planning are
   as following, which are pre-conditions for both underlay
   configurations and overlay configurations.



Liu & Carpenter          Expires April 20, 2019                 [Page 8]


Internet-Draft                 Networkless                  October 2018


   -  Routing domain division: the system can divide the devices into
      groups, according to some mechanisms.

   -  Network hierarchy recognition: the system can learn there is
      hierarchy in the network; and it can even recognize which are
      higher hierarchy and which are lower.

   -  Roles recognition: some device roles are directly related to the
      topology, such as access gateway, aggregation gateway, core
      gateway.

   If the system can figure out the above things, then it would be much
   easier to create the specific configurations.  The IP addresses could
   be assigned in a good order (e.g. from higher hierarchy to lower,
   keep the addresses in a certain prefix for a specific domain); the
   IGP could be inheritably configured according to the routing domain
   divisions.

4.2.  Self-Configuration

   This section is mostly regarding service configurations (e.g.  VPN
   configurations).

   The following figure shows a typical architecture of how current
   state-of-the-art technologies do configurations for services.


























Liu & Carpenter          Expires April 20, 2019                 [Page 9]


Internet-Draft                 Networkless                  October 2018


   (preamble)

                      l3vpn-svc |
                        Model   |
                                |
                         +------------------+         +-----+
                         |   Orchestration  | < --- > | OSS |
                         +------------------+         +-----+
                            |            |
                    +----------------+   |
                    | Config manager |   |
                    +----------------+   |
                            |            |
                            | NETCONF/CLI ...
                            |            |
              +------------------------------------------------+
                                   Network

                                 +++++++
                                 + AAA +
                                 +++++++

         ++++++++   Bearer    ++++++++           ++++++++      ++++++++
         + CE A + ----------- + PE A +           + PE B + ---- + CE B +
         ++++++++  Connection ++++++++           ++++++++      ++++++++

                    Site A                               Site B

   Figure 1: L3VPN Service Configuration Architecture (from RFC8299)

   For this approach, there are several issues:

   1.  Too much details in currently defined service models, which
       implies

       -  Cost a lot of human labor

       -  The more details, the harder to achieve a unified and correct
          model

   2.  Orchestrator/Controller is hard to scale

       -  Binding to specific service and underlay models; need to
          develop new instance when service/underlay varies

       -  Need to compile each single model in each device

   3.  Southbound data models are hard to be unified



Liu & Carpenter          Expires April 20, 2019                [Page 10]


Internet-Draft                 Networkless                  October 2018


       -  Each vendor's capabilities are different

       -  Each operator's needs are different

       -  A long-term puzzle from the SNMP era, not fixed by Netconf/
          YANG

   To address Issue-1, we'll need some easy expression of the network
   service, this surely fits into the Intent-based network field.
   (TBD.)

   To address Issue-2 we might need a intermediate common layer to
   separate the binding between specific service-level models and
   device-level configurations.  (TBD.)

4.3.  Self-Optimization

   TBD.

4.4.  Self-Diagnostic/Healing

   TBD.

5.  Security Considerations

   Security mechanisms such as firewall placement, firewall or route
   filtering rules, authorization to join the network, key distribution,
   VPN encryption policy etc. are potentially subject to all of the
   above.  However, raising security management to Levels 3 or 4
   requires great confidence that the autonomic mechanisms are
   themselves foolproof.  It is to be expected that security management
   remains at Level 0, 1 or 2 longer than most other aspects.  An
   exception is threat or DoS detection, where ML techniques should be
   applicable in the short term.

6.  IANA Considerations

   No IANA assignment is needed.

7.  Acknowledgements

   The initial idea of this work and the "networkless" concept were from
   Xiaofei Xu.








Liu & Carpenter          Expires April 20, 2019                [Page 11]


Internet-Draft                 Networkless                  October 2018


8.  Informative References

   [Anima]    "https://datatracker.ietf.org/wg/anima/about/".

   [I-D.ietf-anima-autonomic-control-plane]
              Eckert, T., Behringer, M., and S. Bjarnason, "An Autonomic
              Control Plane (ACP)", draft-ietf-anima-autonomic-control-
              plane-18 (work in progress), August 2018.

   [I-D.ietf-anima-bootstrapping-keyinfra]
              Pritikin, M., Richardson, M., Behringer, M., Bjarnason,
              S., and K. Watsen, "Bootstrapping Remote Secure Key
              Infrastructures (BRSKI)", draft-ietf-anima-bootstrapping-
              keyinfra-16 (work in progress), June 2018.

   [I-D.ietf-anima-reference-model]
              Behringer, M., Carpenter, B., Eckert, T., Ciavaglia, L.,
              and J. Nobre, "A Reference Model for Autonomic
              Networking", draft-ietf-anima-reference-model-08 (work in
              progress), October 2018.

   [RFC7575]  Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A.,
              Carpenter, B., Jiang, S., and L. Ciavaglia, "Autonomic
              Networking: Definitions and Design Goals", RFC 7575,
              DOI 10.17487/RFC7575, June 2015,
              <https://www.rfc-editor.org/info/rfc7575>.

Authors' Addresses

   Bing Liu
   Huawei Technologies
   Q14, Huawei Campus
   No.156 Beiqing Road
   Hai-Dian District, Beijing  100095
   P.R. China

   Email: leo.liubing@huawei.com


   Brian Carpenter
   Department of Computer Science
   University of Auckland
   PB 92019
   Auckland  1142
   New Zealand

   Email: brian.e.carpenter@gmail.com




Liu & Carpenter          Expires April 20, 2019                [Page 12]