[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Routing requirements draft
Attached please find the manageability requirements draft (now expired),
describing the experiment going on in the routing area. A discussion
about manageability requirements (in all IETF areas) is on the agenda of
the OPS area meeting tomorrow.
Dan
Network Working Group Adrian Farrel
IETF Internet Draft Old Dog Consulting
Proposed Status: Informational
Expires: April 2006 Loa Andersson
Acreo AB
Avri Doria
ETRI
October 2005
draft-farrel-rtg-manageability-requirements-01.txt
Requirements for Manageability Sections in Routing Area Drafts
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be
accessed at http://www.ietf.org/shadow.html.
Abstract
It has often been the case that manageability considerations have
been retrofitted to protocols. This is sub-optimal.
Similarly, new protocols or protocol extensions are frequently
designed without due consideration of manageability requirements.
This document specifies the requirement for all new Routing Area
Internet-Drafts to include an "Manageability Considerations" section,
and gives guidance on what that section should contain.
Farrel, Andersson and Doria Page 1
draft-farrel-rtg-manageability-requirements-01.txt October 2005
1. Introduction
When new protocols or protocol extensions are developed within the
Routing Area, it is often the case that not enough consideration is
given to the manageability of the protocols or to the way in which
they will be operated in the network. The result is that manageablity
considerations are only understood once the protocols have been
implemented and sometimes not until after they have been deployed.
The resultant attempts to retrofit manageablity mechanisms are not
always easy or architecturally pleasant. Further, it is possible that
certain protocol designs make manageablity particularly hard to
achieve.
Recognising that manageablity is fundamental to the utility and
success of protocols designed within the IETF, and that simply
defining a MIB module does not necessarily provide adequate
manageablity, this document defines requirements for the inclusion of
Manageablity Considerations sections in all Internet-Drafts produced
within the Routing Area. Meeting these requirements will ensure that
proper consideration is given to the support of manageability at all
stages of the protocol development process from Requirements and
Architecture, through Specification and Applicability.
It is clear that the presence of such a section in an Internet-Draft
does not guarantee that the protocol will be well-designed or
manageable. However, mandating the inclusion of this section will
ensure that the authors have the opportunity to consider the issues
and by reading the material in this document they will gain some
guidance.
This document is developed within the Routing Area of the IETF and
applies only to Internet-Drafts developed within the Routing Area.
Expanding the scope to cover all protocols developed within the IETF
is an issue for the IESG.
The remainder of this document describes what subsections are needed
within a Manageablity Considerations section, and gives advice and
guidance about what information should be contained in those
subsections.
An appendix contains two example Manageablity Considerations
sections: one from an informational architecture document that was
developed to include a Manageability Considerations section, and one
that has been written for an existing protocol specification RFC that
did not orriginally have such a section.
Farrel, Andersson and Doria Page 2
draft-farrel-rtg-manageability-requirements-01.txt October 2005
2. Presence and Placement of Manageablity Considerations Sections
2.1. Null Manageablity Considerations Sections
In the event that there are no manageablity requirements for the
protocol specified in an Internet-Draft, the draft must still contain
a Manageablity Considerations section. The presences of this section
indicates to the reader and to the reviewer that due consideration
has been given to manageablity, and that there are no (or no new)
requirements.
In this case, the section must contain a simple statement such as
"There are no new manageablity requirements introduced by this
document," and must briefly explain why that is the case with a
summary of manageablity mechanisms that already exist.
Note that a Null Manageability Considerations section may take some
effort to compose. It is important to demonstrate to the reviewer
that no additional manageability mechanisms are required, and it is
often hard to prove that sometihng is not needed.
2.2. Mandatory Subsections
If the Manageablity Considerations section is not null, it must
contain at least the following subsections. Guidance on the content
of these subsections can be found in section 3 of this document.
- Control of Function and Policy
- Information and Data Models, e.g. MIB module
- Liveness Detection and Monitoring
- Verifying Correct Operation
- Requirements on Other Protocols and Functional Components
- Impact on Network Operation
In the event that one or more of these subsections is not relevant,
it must still be present, and should contain a simple statement
explaining why the subsection is not relevant.
2.3. Optional Subsections
The list of subsections above is not intended to be prescriptively
limiting. Other subsections can and should be added according to
the requirements of each individual Internet-Draft.
2.4. Placement of Manageability Considerations Sections
The Manageability Considerations Section should be placed immediately
before the Security Considerations section.
Farrel, Andersson and Doria Page 3
draft-farrel-rtg-manageability-requirements-01.txt October 2005
3. Guidance on the Content of Subsections
This section gives guidance on the information to be included in each
of the mandatory subsections listed above. Note that just as other
sub-sections may be included, so additional information may also be
included in these subsections.
3.1 Control of Function and Policy
This sub-section is intended to describe the configurable items that
exist for the control of function or policy.
For example, many protocol specifications include timers that are
used as part of operation of the protocol. These timers often have
default values suggested in the protocol specification and do not
need to be configurable. But it is often the case that the protocol
requires that the timers can be configured by the operator to ensure
specific behavior by the implementation.
Even if all configurable items have been described within the body of
the document, they should be identified in this sub-section, but a
reference to another section of the document is sufficient if there
is a full description elsewhere.
3.2 Information and Data Models
This sub-section should describe the information and data models
necessary for the protocol or the protocol extensions. This includes,
but is not necessarily limited to the MIB modules developed
specificially for the protocol functions specified in the document.
The description can be by reference where other documents already
exist.
3.3 Liveness Detection and Monitoring
Liveness detection and monitoring applies both to the control plane
and the data plane.
Mechanisms for detecting faults in the control plane or for
monitoring its liveness are usually built into the control plane
protocols or inherited from underlying data plane or forwarding plane
protocols. These mechanisms do not typically require additional
management capabilities. However, when a control plane fault is
detected, there is often a requirement to coordinate recovery action
through management applications or at least to record the fact in an
event log.
Farrel, Andersson and Doria Page 4
draft-farrel-rtg-manageability-requirements-01.txt October 2005
Where the protocol is responsible for establishing data or user plane
connectivity, liveness detection and monitoring usually need to be
acchieved through other mechanisms. In some cases, these mechanisms
already exist within other protocols responsible for maintaining
lower layer connectivity, but it will often be the case that new
procedures are required so that failures in the data path can be
detected and reported rapidly allowing remedial action to be taken.
3.4 Verifying Correct Operation
An important function that OAM can provide is a toolset for verifying
the correct operation of a protocol. This may be achieved to some
extent through access to information and data models that report the
status of the protocol and the state installed on network devices.
But it may also be valuable to provide techniques for testing the
effect that the protocol has had on the network by sending data
through the network and observing its behavior.
Thus, this section should include a discussion about how the correct
end-to-end operation of the network can be tested, and how the
correct data or forwarding plane function of each network element can
be verified.
3.5 Requirements on Other Protocols and Functional Components
Here the text should describe the requirements that the new protocol
puts on other protocols and functional components, as well as
requirements from other protocols that has been considered in
desinging the new protocol
3.6 Impact on Network Operation
The introduction of a new protocol or extensions to an existing
protocol may have an impact on the operation of existing networks.
This section should outline such impacts (which may be positive)
including scaling concerns and interactions with other protocols.
For example, a new protocol that doubles the number of acitve,
reachable addresses in use within a network might need to be
considered in the light of the impact on the scalability of the IGPs
operating within the network.
3.7 Other Considerations
Anything that is not covered in one of the mandatory subsections
described above, but which is needed to understand the manageability
situation should be covered in an additional section.
Farrel, Andersson and Doria Page 5
draft-farrel-rtg-manageability-requirements-01.txt October 2005
4. Manageability Considerations
This document defines the Manageability Considerations sections for
inclusion in all Routing Area Internet-Drafts. As such, the whole
document is relevant to manageability.
5. IANA Considerations
This document does not introduce any new codepoints or name spaces
for registration with IANA.
Routing Area Internet-Drafts should not introduce new codepoints or
name spaces for IANA registration within the Manageability
Considerations section.
6. Security Considerations
This document is informational and describes the format and content
of future Internet-Drafts. As such it introduces no new security
concerns.
However, there is a clear overlap between security, operations and
management. The manageability aspects of security should be covered
within the mandatory Security Considerations of each Routing Area
Internet-Draft. New security consideration introduced by the
Manageability Considerations section should also be covered in the
Security Considerations section.
7. Acknowledgements
The authors would like to extend their warmest thanks to Alex Zinin
for inviting them to write this document.
Peka Savola provided valuable feedback on an early version of this
document.
8. Intellectual Property Considerations
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Farrel, Andersson and Doria Page 6
draft-farrel-rtg-manageability-requirements-01.txt October 2005
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
9. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3667] Bradner, S., "IETF Rights in Contributions", BCP 78,
RFC 3667, February 2004.
[RFC3668] Bradner, S., Ed., "Intellectual Property Rights in IETF
Technology", BCP 79, RFC 3668, February 2004.
10. Informational References
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP: 26, RFC 2434,
October 1998.
[RFC3552] Rescorla E. and B. Korver, "Guidelines for Writing RFC
Text on Security Considerations", BCP: 72, RFC 3552,
July 2003.
11. Authors' Addresses
Adrian Farrel
Old Dog Consulting
EMail: adrian@olddog.co.uk
Loa Andersson
Acreo AB
Email: Loa.Andersson@acreo.se
Avri Doria
ETRI
Email: avri@acm.org
Farrel, Andersson and Doria Page 7
draft-farrel-rtg-manageability-requirements-01.txt October 2005
12. Full Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Farrel, Andersson and Doria Page 8
draft-farrel-rtg-manageability-requirements-01.txt October 2005
Appendix A. Example Manageabilty Considerations Sections
A.1 Informational / Architecture Document
This section contains a copy of the Manageability Considerations
section included in the Path Computation Element (PCE) Architecture
document published as draft-ietf-pce-architecture [to be updated with
RFC number when known].
x. Manageability Considerations
The PCE architecture introduces several elements that are subject to
manageability. The PCE itself must be managed as must its
communications with PCCs and other PCEs. The mechanism by which PCEs
and PCCs discover each other are also subject to manageability.
Many of the issues of manageability are already covered in other
sections of this document.
x.1 Control of Function and Policy
It must be possible to enable and disable the PCE function at a PCE,
and this will lead to the PCE accepting, rejecting, or simply not
receiving requests from PCCs. Graceful shutdown of the PCE function
should also be considered so that in controlled circumstances (such
as software upgrade) a PCE does not just 'disappear' but warns its
PCCs and gracefully handles any queued computation requests (perhaps
by completing them, forwarding them to another PCE, or rejecting
them).
Similarly it must be possible to control the application of Policy at
the PCE through configuration. This control may include the
restriction of certain functions or algorithms, the configuration of
access rights and priorities for PCCs, and the relationships with
other PCEs both inside and outside the domain.
x.2 Information and Data Models
It is expected that the operations of PCEs and PCCs will be modeled
and controlled through appropriate MIB modules. The tables in the new
MIB modules will need to reflect the relationships between entities
and to control and report on configurable options.
Statistics gathering will form an important part of the operation of
PCEs. The operator must be able to determine the historical
interactions of a PCC with its PCEs, the performance that it has
seen, and success rate of its requests. Similarly, it is important
for an operator to be able to inspect a PCE and determine its load
and whether an individual PCC is responsible for a disproportionate
Farrel, Andersson and Doria Page 9
draft-farrel-rtg-manageability-requirements-01.txt October 2005
amount of the load. It will also be important to be able to record
and inspect statistics about the communications between the PCC and
PCE, including issues such as malformed messages, unauthorized
messages and messages discarded owing to congestion. In this respect
there is clearly an overlap between manageability and security.
Statistics for the PCE architecture can be made available through
appropriate tables in the new MIB modules.
The new MIB modules should also be used to provide notifications
(formerly known as traps) when key thresholds are crossed or when
important events occur. Great care must be exercised to ensure that
the network is not flooded with SNMP notifications. Thus it might be
inappropriate to issue a notification every time that a PCE receives
a request to compute a path. In any case, full control must be
provided through the MIB modules to allow notifications to be
disabled.
x.3 Liveness Detection and Monitoring
Section 6.5 [of the PCE architecture document] discusses the
importance of a PCC being able to detect the liveness of a PCE.
PCE-PCC communications techniques must enable a PCC to determine the
liveness of a PCE both before it sends a request and in the period
between sending a request and receiving a response.
It is less important for a PCE to know about the liveness of PCCs,
and within the simple request/response model, this is only helpful:
- to gain a predictive view of the likely loading of a PCE in the
future
- to allow a PCE to abandon processing of a received request.
x.4 Verifying Correct Operation
Correct operation for the PCE architecture can be classified as
determining the correct point-to-point connectivity between PCCs and
PCEs, and assessing the validity of the computed paths. The former is
a security issue that may be enhanced by authentication and monitored
through event logging and records as described in Section x.1. It may
also be a routing issue to ensure that PCC-PCE connectivity is
possible.
Verifying computed paths is more complex. The information to perform
this function can, however, be made available to the operator through
MIB tables provided full records are kept of the constraints passed
on the request, the path computed and provided on the response, and
Farrel, Andersson and Doria Page 10
draft-farrel-rtg-manageability-requirements-01.txt October 2005
any additional information supplied by the PCE such as the constraint
relaxation policies applied.
x.5 Requirements on Other Protocols and Functional Components
At the architectural stage it is impossible to make definitive
statements about the impact on other protocols and functional
components since the solutions work has not been completed. However,
it is possible to make some observations.
- Dependence on underlying transport protocols
PCE-PCC communications may choose to utilize underlying protocols
to provide transport mechanisms. In this case some of the
manageability considerations described in the previous sections may
be devolved to those protocols.
- Re-use of existing protocols for discovery
Without prejudicing the requirements and solutions work for PCE
discovery (see Section 6.4 [of the PCE Architecture document) it is
possible that use will be made of existing protocols to facilitate
this function. In this case some of the manageability
considerations described in the previous sections may be devolved
to those protocols.
- Impact on LSRs and TE LSP signaling
The primary example of a PCC identified in this architecture is an
MPLS or GMPLS LSR. Consideration must therefore be given to the
manageability of the LSRs and the additional manageability
constraints applicable to the TE LSP signaling protocols.
As well as allowing the PCC management described in the previous
sections, an LSR must be configurable to determine whether it will
use a remote PCE at all - the options being to use hop-by-hop
routing or to supply the PCE function itself. It is likely to be
important to be able to distinguish within an LSR whether the route
used for a TE LSP was supplied in a signaling message from another
LSR, by an operator, or by a PCE, and in the case where it was
supplied in a signaling message whether it was enhanced or expanded
by a PCE.
x.6 Impact on Network Operation
This architecture may have two impacts on the operation of a network.
It increases TE LSP setup times while requests are sent to and
processed by a remote PCE, and it may cause congestion within the
network if a significant number of computation requests are issued in
Farrel, Andersson and Doria Page 11
draft-farrel-rtg-manageability-requirements-01.txt October 2005
a small period of time. These issues are most severe in busy networks
and after network failures, although the effect may be mitigated if
the protection paths are precomputed or if the path computation load
is distributed among a set of PCEs.
Issues of potential congestion during recovery from failures may be
mitigated through the use of pre-established protection schemes such
as fast reroute.
It is important that network congestion be managed proactively
because it may be impossible to manage it reactively once the network
is congested. It should be possible for an operator to rate limit the
requests that a PCC sends to a PCE, and a PCE should be able to
report impending congestion (according to a configured threshold)
both to the operator and to its PCCs.
x.7 Other Considerations
No other management considerations arise.
A.2 Protocol Definition Document
This section provides an example Manageability Considerations
section that might have been included in RFCxxxx had this document
been in force at the time that the RFC was initially drafted.
There is no implied criticism of the authors of RFCxxxx or of the
yyyy working group that produced it. The RFC has been chosen simply
because it is familiar to the authors.
y. Manageability Considerations
y.1. Control of Function and Policy
y.2 Information and Data Models
y.3 Liveness Detection and Monitoring
y.4 Verifying Correct Operation
y.5 Requirements on Other Protocols and Functional Components
y.6 Impact on Network Operation
Farrel, Andersson and Doria Page 12