Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Отраслевые издания
Год издания: 0
isbn: 9781119675518
Скачать книгу
delay, loss, and reordering measurements. OWAMP can be used bi‐directionally to measure one‐way metrics in both directions between two network elements. However, it does not natively support round‐trip or two‐way measurements. The TWAMP extends the OWAMP capabilities to add two‐way or round‐trip measurement. Two hosts are involved in the measurement. In the case of OWAMP, the sender and the receiver collaborate actively to measure the desired performance index. For instance, to compute the one‐way‐delay, both take a proper timestamp of the measurement packet, at the sending and receiving time, respectively. In the TWAMP, the receiver can act as a simple reflector that just sends back (or to a third party) the probe packet sent by the sender, with no additional computation effort.

      1.2.5 Routing Protocols and Monitoring Platforms

      Routing protocols are among the most successful deployed solutions to manage a network. A routing protocol specifies how routers communicate each other to exchange information that allows them to get the current network topology and compute the paths to reach possible destinations. Routing protocols give the Internet the ability to dynamically adjust to changing conditions such as topology changes, links and node failures, and congestion situations. There are two main classes of routing protocols in use on IP networks. Interior gateway protocols based distance‐vector routing protocols, such as Routing Information Protocol (RIP) [15], Enhanced Interior Gateway Routing Protocol (EIGRP) [16], or based on link‐state routing protocols, such as Open Shortest Path First (OSPF) [17], Intermediate System to Intermediate System IS‐IS [18], are used in networks that belong to the same administrator domain, i.e. within the same Autonomous System (AS). Interior gateways protocols base their decision on the minimization of the path costs, defined as the sum of link costs. As such, they aim at minimizing the cost of routing the traffic, i.e. maximizing the performance. Exterior gateway protocols aim instead at exchanging routing information between Autonomous Systems and finding the most convenient path – in terms of Autonomous Systems – to reach the destination. Here, Border Gateway Protocol (BGP) [19] is the de facto only choice. It is a path‐vector routing protocol and it makes routing decisions based on network policies and rules and not based on cost functions. BGP allows network operators to define routing policies that reflects administrative costs and political decisions in terms of agreements between Autonomous Systems.

      Given the importance of optimizing exterior routing policies and the partial view that each network operator can get of the global Autonomous System (AS) level topology, several mechanisms are in place to gain visibility on the current Internet routing. Among those, the University of Oregon Route Views Project [20] leverages information provided by collectors, vantage points that expose their partial view of the BGP data, to create interactive maps, which are historized and made browsable via an ecosystem of tools and software that simplify the management and query of the information [21]. Thanks to Routeviews and the information exposed by BGP, it is possible to observe Internet‐wide outages [22, 23], routing hijacking [24], routing anomalies [25], or check the IPv4 address space utilization [26].

      As said, while there has been a standardized means to collect information about the status of devices and of traffic, each vendor typically offers its own mechanisms to distribute configurations. The heterogeneity of devices, vendors, and versions makes indeed it difficult to define a common and flexible structure able to support and fit different requirements. This hampered the adoption of standard protocols, which are confined to a mostly academic design, with little deployment.

      1.3.1 Standard Configuration Protocols and Approaches

      The NETCONF protocol is an example of a standard mechanisms that allow to install, manipulate, and delete the configuration of network devices [31]. It uses an XML‐based data encoding for the configuration data as well as the protocol messages. A key aspect of NETCONF is that it allows the functionality to closely mirror the native command‐line interface of the device. It provides a standard way for authentication, data integrity, and confidentiality. For this, it depends on the underlying transport protocol for this capability. For example, connections can be encrypted in TLS or SSH, depending on the device support. Along with NETCONF, a data modeling language defining the semantics of operational and configuration data, notifications, and operations has been defined via the introduction of the YANG modeling language [32]. Neither NETCONF nor YANG ever succeed in becoming an actual standard, given the difficulty to find a common and flexible ground that fits all requirements.

      The Common Open Policy Service (COPS) is a protocol that provides a client/server model to support policy control. The COPS specification is independent of the type of policy being provisioned (QoS, security, etc.) but focuses on the mechanisms and conventions used to distribute information between PDPs and PEPs. COPS has never been widely deployed because operators found its use of binary messages complicates the development of automated scripts for simple configuration management tasks.

      1.3.2 Proprietary Configuration Protocols

      As previously said, each vendor has implemented its own solution to collect, change, distribute configurations and system updates. Big vendors such as Cisco Systems, Juniper Networks, Huawei, etc. provide different suites that range from solutions for simple local area networks (LANs), to internet provider scale solutions. The so called Network Management Systems [34] simplify the management of the administered network offering centralized solutions that allow one to perform device discovery, monitoring and management, network performance analysis, intelligent notifications, and customizable alerts. To interact with devices, they build on standard protocols such as SNMP or syslog, but often use also custom solutions based on Command Line Interfaces (CLI) that can be reached via SSH or telnet (deprecated for security reasons). For instance, the Cisco Configuration Professional is a Graphical User Interface (GUI)‐based device management tool for Cisco access routers. This tool simplifies routing, firewall, Intrusion Prevention System (IPS), VPN, unified communications, wide area network (WAN) and LAN configurations through GUI‐based easy‐to‐use wizards.