NOTE: This charter is a snapshot of the 47th IETF Meeting in Adelaide, Australia. It may now be out-of-date. Last Modified: 29-Feb-00
Ed Ellesson <firstname.lastname@example.org>
John Strassner <email@example.com>
Operations and Management Area Director(s):
Randy Bush <firstname.lastname@example.org>
Bert Wijnen <email@example.com>
Operations and Management Area Advisor:
Bert Wijnen <firstname.lastname@example.org>
To Subscribe: email@example.com
In Body: subscribe
Description of Working Group:
Note: Russ Mundy is the Security Technical advisor for this WG.
There is a need to represent, manage, share, and reuse policies and policy information in a vendor-independent, interoperable, and scalable manner. This working group has three main goals. First, to provide a framework that will meet these needs. Second, to define an extensible information model and specific schemata compliant with that framework that can be used for general policy representation (called the core information model and schema). For now, only a directory schema will be defined. Third, to extend the core information model and schema to address the needs of QoS traffic management (called the QoS information model and schemata).
The viability of the framework will be proven by demonstrating that high-level policy information can be translated into device configuration information for network QoS applications. This requires the coordination of the core and QoS schemata, the PIB and MIB being developed in DiffServ, and possibly extensions to COPS provisioning, which is being developed in RAP. A secondary goal of this framework is to show that this general development process can be extended to other application domains.
The objectives of this working group are to:
1. Identify a set of representative use cases to guide us in defining a policy framework, information model, and schemata to store, retrieve, distribute and process policies. These use cases should map to a set of policy rules, and aid us in defining the composition of policies.
2. Define a framework for intra-domain policy definition and administration for a heterogeneous set of Policy Decision and Enforcement Points. Here, "intra-domain" refers to policy components that are all under the same (and exclusive) administrative control. The framework will be shown to be able to be used to represent, distribute, and manage policies and policy information in an unambiguous, interoperable manner in a single administrative domain. This framework will be applied to network QoS.
3. A general information model, derived from the CIM/DEN policy model, will be produced. This is intended to serve as a generic means for representing policies and policy information. In addition, a mapping of this information model to a form that can be implemented in a directory that uses LDAPv3 as its access protocol will also be done.
4. Refinements to the above, for representing signaled and provisioned QoS, will be done. That is, both the information model as well as the schema will be extended to focus on network QoS. This will also be used to prove the general extensibility of the model.
5. A key part of demonstrating that this model can provide end-to-end translation of high-level policy specifications to device configurations is to ensure that the information model and schemata are compatible with and can use the information contained in the PIB(s) and MIB(s) being developed in the Differentiated Services WG. To this end, the Policy Framework WG will supply input to the development of the PIBs, and include all applicable PIBs and MIBs in its development considerations for the framework, information model, and schemata.
6. Policy information may be communicated using several protocols. The COPS protocol, being developed in the RAP WG, is an example of one such protocol. The Policy Framework WG will work with the RAP WG to define usage directives for use of the COPS base protocol to support policy information exchange transactions within the framework being standardized in the Policy Framework WG.
7. The Policy Framework WG will work closely with the IPSP WG to ensure that the IPsec data model fits and can be supported within the general framework defined by the Policy Framework WG.
8. The Policy Framework WG will work with other WGs as needed to ensure that the framework, information model, and specific schemata produced meet the needs of these WGs.
9. The charter specifically excludes:
-schema attributes or classes that are vendor-specific (although the schema defined in this group will be defined in a way that is extensible by specific vendors)
Goals and Milestones:
WG Last Call for FYI RFC
WG last call on Policy terminology draft (Informational Track)
Submit Internet Draft on Use case definition (Informational Track)
WG last call on Core information model draft (Standards Track)
WG Last Call on Use case definition (Informational Track)
WG Last Call on Framework draft (Informational Track)
WG Last Call on QoS Schema draft(s) (Standards Track)
No Request For Comments
IETF-47 Policy Framework WG Minutes
Day One, Policy Framework WG
Minutes recorded by John Strassner
The agenda was discussed. No changes were made. For your reference, the agenda was:
1st Session, 1300-1500 Mon, 27 March
Agenda Bashing - Ed (5)
Status Update - Ed/John (15)
- PCIM - WG Last Call Results - Bob (15)
- PCIM - Final Draft Review - Bob (25)
- PCS (Policy Core Schema) Review - Bob (10)
- Polterm Requirements Doc - Fran (15)
- Policy Framework Status - Mark (15)
- Policy Monitoring - Bob/Ken (15)
(postponed to Wed.)
- no draft, just general thoughts; draft is pending Wrapup - Ed (5)
2nd Session, 1300-1500 Wed, 29 March
- Policy Monitoring - Bob/Ken (10) (resched)
no draft, just thoughts
- QoS Policy Extensions - John to give an intro (5)
- QoS Policy Info Model (new draft) - John (22)
- QoS Policy Schema (revision) - John (20)
- QoS PHB Specifications - John (5)
- QoS Device Info Model Update - Walter (22)
(will be available by 3/20/00, note name change)
- Requirements and Use Case - Hugh (23)
- Policy Scalability - Hugh (08)
- Wrapup - Ed (5)
(Note: due to a long discussion about whether and when a second working group last call should start, the Policy Monitoring draft was moved to the second session and the draft discussion in that session were compressed to accommodate the change)
Status - John Strassner
John gave a brief overview of the overall status. The bad news is that we're behind our charter goals. The good news is that we've had a lot of activity this last round. Every draft listed above in the agenda is either a new draft or an update to an existing draft. The exceptions are the framework draft, which has been waiting for consensus to build in other affected working groups, and the core schema, which is waiting until the core information model gets out of working group last call.
Q: Are we doing another call for the core information model?
A: This ended up being a somewhat lengthy discussion.
Here's a summary.
There are two outstanding issues in the core model. The first is representation of time, which Bob will talk about shortly. We have an answer, so this will be resolved. The second was clarification for roles, which we added. All other last call comments have been addressed in the document.
Now, we want to strike a balance between doing the right thing (having another formal working group last call) and trying to get the document issues as soon as possible. The argument against having another working group last call is it will cause at least another week and a half delay (repository doesn't open till April 7) and there really isn't anything more to discuss. ;-) Argument for another working group last call is that is how the procedure should take place, and since this is for Proposed Standard, we shouldn't take any short cuts. After further discussion, we decided to go the formal route and have a last call start as soon as the draft was placed in the repository.
Q: And when is last call for core schema?
A: The core schema will go to last call when the IETF Last call completes of the core information model.
Q: Can't we move this up a bit?
A: Bert agreed. It was decided that we update and send into last call another revision of the core schema, approximately 2 weeks (sooner if possible) after the core information model completes its second last call. This would make it available roughly in mid-May.
Core Info Model - Bob Moore
Several editorial comments were raised, and addressed in the 04 version of this draft. One issue was raised, and resolution will be discussed below. This is the time issue, and will cause the version of the Policy Core Information Model (PCIM) to be revised to 05, and will be the main focus of attention for the second WG last call.
The main issues talked about during the change from 03 to 04 in the first working group last call were:
- declarative vs. procedural model (wording clarified)
- discussion of roles (wording clarified)
- new PolicyRoles property added to policyRule
- UCS-2 encoding for CIM strings explained more fully
- Changed encodings of PolicyTimePeriodCondition mask properties from strings to octet strings
- Clarified encoding of OIDs for ConstraintEncoding and ActionEncoding properties
- Expanded the names for several of the association classes and their reference properties
- Updated Security Section
- Updated Acknowledgments and References sections, along with minor editorial fixes
We then had a discussion about roles in the meeting. There was concern voiced that the roles definition was still not as clear as it could be. For example, what happens, specifically, when it is desired to retrieve all policies that are defined for the role-combination BGP+RIP? It is assumed that this will cause all policies for BGP, all policies for RIP, and all policies that deal with both BGP and RIP to be downloaded to the PDP. However, this is not explicitly spelled out. There was a request for additional clarification to state explicitly that all of these policies get downloaded to the PDP. It is then up to the PDP to either filter only the BGP+RIP policies and send those policies to the PEP, or to ship additional policies to the PDP and have the PDP decide what to act on. This text will be added as part of the 05 draft. This action item is assigned to John.
Time issue. The basic issue was that the semantics and syntax for the time-range properties in the policyTimePeriodConditionclass should match those specified in RFC 2445 (iCalendar document). This RFC already has a convention for representing time intervals, and the suggestion was that we use that convention instead of our own. Proposed resolution:
- When both ends of the time period are specified, use the convention in RFC 2445
- When there is an open ended time period (from some time before till or from now till forever), RFC 2445 doesn't have this capability. So we'll solve this by glueing together the specification of each end according to RFC 2445.
- For timeOfDayMask property, change the representation to conform to RFC2445 by starting the time with a T and replacing our delimiter (a colon) with the RFC 2445 delimiter (a slash). As an example, we could have: Thhmmss/Thhmmss.
So far, so good. However, once we started talking to the iCalendar people, we realized that there was yet another problem with the representation of time zones. This affects the ApplicableTimeZone property . We use a static offset from UTC time, as does almost everyone else. But this is wrong, because for example, countries that have daylight time change their offsets twice a year. We observe that we are just as good (or bad) as SNMP, LDAP, and many other protocols in this area, and therefore we should change when the other protocols change. Bert and Patrik Falstrom are investigating and will get back to us.
The action item for updating the first two items with respect to time definition is assigned to Bob.
Next steps. We need another two-week last call. After some discussion, we decided that we will wait to have a working group last call start Monday 10 April, since that is the first date that people may be able to get the document from the repository. John or Ed will ensure that the document is updated and posted to the repository as soon as it opens up (7 April).
Core LDAP Schema - Bob Moore
We need to incorporate recent work done in the DMTF plus work that Ryan Moats has done in mapping information models to the LDAP schema. Then, we will be ready to issue another revision of this document.
Q: what about definitions such as port and protocol? These objects have added semantics that should be captured in the Core information model and schema, instead of remaining in the QoS models.
A: There are some problems associated with this, such as coordinating this work with other working groups that want to use these.
Q: But there are a number of IETF-specific constants (for example, protocol and port) that are IP-specific.
A: But moving this to the Core information model and schema means that other working groups, such as IPSP, must use it. Furthermore, it means that working groups that don't need a concept of port or protocol would be saddled with it.
A: IPSP wanted to differentiate between distribution and configuration of policies. So the current IPSP draft isn't really tied into the Policy model; rather, it is trying to model lower-level information that can be controlled by higher-level policy (similar to the division in the QoS models in Policy).
Bert thinks that if it is indeed general, then we should consider moving this information into the Core Info Model and Schema. This then raised a discussion as to (1) its feasibility and (2) its practicality. Feasibility is the actual mechanics of moving the information; practicality is when, and how that will affect the schedule.
One additional possibility is to have a third document -information model proposed common concepts (and of course, a companion LDAP mapping document). This is the subject for further discussion on the list. The chairs recommend that we wait until the Policy QoS and Device QoS models are re-published, along with the IPSP model, to see if these are indeed general concepts.
Action Item: Bob Moore to coordinate the updating of the Policy Core Schema draft. This should wait until the working group last call of the PCIM has finished, just to make sure that nothing changes. The goal will be to issue a new revision as close to two weeks from a successful working group last call close of the PCIM.
Policy Terminology - Francis Reichmeyer
Approach. Several working groups are working on policy networking terminology. The list includes (at least) RAP, Policy, DiffServ, and IPSP. Others are being added (e.g., MPLS). The result is a lot of policy terms and definitions, with some conflicts occurring. The focus of this document is to resolve those conflicts and to put these terms in one place.
Goal: identify relevant common terms that all working groups can use.
Non-goal: common policy architecture
Q: Does this draft introduce new terms?
Approaches to Policy. This section talks about Policy, management and administration of policy, the notion of policy domains, and meta-policy. These latter two were new to some people. A policy domain is a collection of objects that have been explicitly grouped together so that they can share the same policies. There is an implied common administration that happens. Domains can be nested, in order to reflect hierarchical semantics. A meta-policy is a policy that defines how policies are constructed. Another way of thinking about this is that it defines how to build other policies.
Policy Management Models. Three are defined: outsourcing, provisioning, and interactive (though there is a question as to whether this one is needed or not). An outsourced policy model directs certain components of the policy framework to rely upon other components of that same framework in order to perform policy-related decisions. A provisioned policy model implements policy by first configuring devices that will execute policy decisions prior to the events that will prompt those decisions. No real-time interaction is done here - this model consists of configuring a device so that it will do the right thing sometime later. An interactive policy model implements policy by installing policy expressions within appropriate components of the policy framework. This means that policies are complete, self-contained expressions, and that there are a set of rules that define the interaction between a process that requires policy decisions to be made and the constituent components of the policy framework that enforce those decisions through executing a set of actions.
Q: Are these three terms reflective of work being done in an architecture, or is it something that was invented as part of this work? If it was invented, then we should not use it. (In other words, the purpose of this draft is to document terms, not invent new ones).
A: Good feedback, the authors will discuss this again.
A: The purpose of this document is to be a "living" document that grows as the working groups that are using it gain more experience and form tighter definitions of policy.
Q: Outsourcing and provisioning reflect a COPS legacy, where interactive reflects a policy legacy. Policy is all about a condition-action pair, and controlling the interaction between a PDP and a PEP.
A: Provisioning is pure configuration. Outsourcing is asking for help. Interactive is describing capabilities.
The chairs appealed for volunteers to write up and comment on text. Shai to argue against interactive, and Walter to argue for interactive. Everyone else is free to join in the discussion. ;-)
Abstraction and Scoping. Four key concepts are defined in this section: Administrator-defined, device-independent, device-dependent, and roles. Roles are used to help define scoping.
Q: what about network-wide policies?
A: not explicitly identified as such, but this term should be added to the next revision of the document.
Q: Also, don't like "administrator-defined". This should instead be bound to a specific scope, such as administrator for a network, etc.
A: Authors to discuss and either incorporate or add additional clarifying text.
Q: Are there multiple definitions of roles? In other words, is this definition synchronized with the definition in the PCIM?
A: The intent is most assuredly to NOT have multiple definitions. Unfortunately, the definitions are not currently synchronized with the PCIM, but they will be in the next revision.
Q: Concern that by defining the functions of a policy system, there is a strong chance of these terms conflicting with other documents.
A: Good point. So if this document is a "passive" document (i.e., no new terms are defined), then if there needs to be a new term, the authors of this document should contact the appropriate architecture or framework document and get them updated.
This last question led to a general discussion of which working group should own this document. It was offered that
Policy owns this, and RAP agreed. Need to check with IPSP and DiffServ. (Editor's note: subsequently, IPSP and DiffServ responded, saying it was OK. Thus, this document needs to be added to the Policy Framework working group charter. Action item: John/Ed to do this).
Framework document - Mark Stevens
Document hasn't received much attention, due to other pressing matters that this draft depends on. The authors are going to be revising this and hope to get a new revision out in April (May at the latest). Feedback is encouraged.
Wrapup of First Day (Ed).
1. New version of PCIM (-05) will be completed by the end of this week (pending discussion of moving constants from QoS model to PCIM
2. Time period changes will also be incorporated by next week.
3. John to update roles section by next week.
4. Bert to check with Marcus on time zone handling.
5. Monitoring to be moved onto Wednesday session.
6. Which working group should own policy terminology? Tentatively Policy, but need to check with IPSP and DiffServ, and also need to ensure that it is a working document that incorporates needs of the other working group
7. Shai and Walter to suggest text describing use of interactive.
Policy, Day Two
Policy Monitoring - Bob Moore
(No draft yet)
Why monitoring (i.e., what are the requirements that we are trying to address)?
Administrators need to know which policies (active and inactive) are present at a PDP, and whether these policies are meeting their objectives and being properly enforced. There needs to be a "core" policy MIB to tie all of the individual policy-related MIBs together.
It is proposed that a new draft be written that addresses these issues. Note that the scope is monitoring only -- we have other mechanisms for configuring policies.
The next question is what to monitor. There are two broad categories of items that need monitoring - the policy framework itself, and whether polices are acting correctly and being enforced or not. This is more complicated that it initially appears to be. There can be several protocols (e.g., a policy repository protocol, like LDAP, as well as policy protocols themselves (e.g., COPS and SNMP). In addition, there are issues with respect to instrumenting different domains (e.g., QoS and IPSec will have different needs).
There are a set of nine possible instrumentation points envisioned. These divide into the ingress, inside and egress of the Policy repository and PDP (6), the ingress and inside of the PEP (2), and the policy-managed resource itself (1). All except this latter one use the policy framework. More specifically, they are:
1. PM tool to repository
2. inside the repository
3. repository to PDP
4. PDP to repository
5. Instrumented inside the PDP
6. PDP looking at PEP
7. implemented at a policy-aware PEP, policy flows from the PEP to the PDP
8. the MIB that instruments the function that is policy-controlled
9. the PEP itself
There are a set of MIBs that exist. The question is, how do we proceed to harmonize/rationalize these MIBS and relate them to the Policy Framework working group? This draft will help define this relationship.
Policy QoS Information Model - John Strassner
This draft was built by abstracting the concepts in the QoS Policy schema. It is acknowledged that not all of the "LDAPisms" have been successfully purged from this document, and that it should be further generalized. This will happen in the next revision.
The purpose of this draft is to extend the generic concepts of policies to a form that is more suitable for representing policies that control DiffServ and IntServ. It fits as the middle layer of policies, refining on generic concepts (for interoperability) and using specific mechanisms as defined in the QoS Device Information Model (to be discussed later). For example, it defines the concept of a policer. This is not a generic extension (e.g., DHCP doesn't require one); it is a concept that is needed by DiffServ and IntServ.
This draft is actually the third major revision - it is a 00 draft because it has just moved from the individual namespace to the working group namespace. The following changes were made during this revision:
- Added a lot of detail to QoS actions (both DiffServ and IntServ)
- Added functionality, yet simplified, repository usage
- Added granularity to representing constants and variables
- Added changes to match the latest version of the PCIM
- Added examples
- Minor editorial changes as suggested per working group comments
There were also some extensions to the PCIM. The most important of these were to extend the decision process to allow rule nesting and rule-group interaction, and to support the concept of nested rules and sub-rules.
Objectives of this draft.
The specific goals of this draft is to extend the generic notion of policy, as expressed in the PCIM, to better represent the needs of DiffServ and IntServ. This takes several forms:
- to refine the concepts of repositories, conditions and actions for expressing QoS policy rules
- to ensure that a simple way is available to build hierarchical namespaces for administration and scoping of policy rules
- to build a framework of classes that help ensure that devices of different capabilities interpret QoS mechanisms the same way
- to provide for rule-specific as well as reusable policy rules, conditions and actions; and to be able to define at a high-, a device-independent, or a device-dependent level, DiffServ and IntServ policies.
This draft can't do the last two bullets by itself. But it can be one of the tools that, combined with other work, can accomplish these together.
As stated previously, this draft is one of several that work together to define a continuum of policies. A chart was displayed that provided three different abstractions. The highest was administrator-defined. This level is device-, technology- (e.g., DiffServ) and mechanism- (e.g., WFQ) independent. An example is:
IF User is subscribed to Gold Service,
allow use of NetMeeting and
provide premium data services
The next lower layer is characterized by device- and mechanism-independent, but technology-specific, policy rules. These policies translate the higher-level administratively-defined policy rules to a form that can be more easily translated to a device. An example is:
IF sourceIPAddress == 184.108.40.206/15,
mark voice with EF and
mark data with AF
The third layer is characterized by a device-independent, technology- and mechanism-dependent policy. This type of policy is used to do the following three types of configuration:
- configure a component so it can be used to condition forwarded traffic
- configure a component so that it can act on received traffic directly
- trigger an action based on a network or a system event (e.g., link failure)
These configuration actions take the form of performing a set of device-independent actions (e.g., configure a classifier, then configure a filter and bind it to the classifier, etc.). This draft serves as the integration point for binding high-level QoS policies to low-level QoS policies.
The concept of reusable repositories was discussed. This is an extension of the repository concept that is present in the PCIM. Repositories in the QoS Policy model serve the following three purposes:
- containers for reusable objects
- maintenance mechanism for ensuring the integrity and proper updating of reusable objects
- provide a hierarchical namespace and context for reusable objects
The repository implementation has been simplified. The policyRepository class of the PCIM is used, and additional semantics are provided by subclassing the policyGroup class. Basically, the policyRepository class is used to define the root of the policy repository. The qosPolicyDomain class is used to define the roots of various administrative domains that reside in the policy repository. Within each qosPolicyDomain, one or more qosNamedPolicyContainers can be used to define policies that are specific to a particular group of objects.
Several examples were given. One illustrated the above process, showing how policy rules could be grouped first by container, then by domain. Another illustrated the more granular decision-making process that the QoS Policy Schema supports. Several examples were also provided of showing how QoS policy rules could be constructed.
QoS action extensions were then covered. DiffServ actions include classification, and then the ability to mark, police, and/or shape to a specified traffic profile. IntServ actions included controlling RSVP, as well as signaling and install actions. Note that it is expected that the QoS Device Information Model will supply the specific parameters that are controlled and manipulated by these actions. A good analogy is that the QoS Device Information Model represents the DiffServ and IntServ mechanisms of the device, while the QoS Policy Information Model shows how to configure and manage these mechanisms.
There is one main open issue, which is whether to move the variables and constants that are defined in this draft up to the core information model or not. This will be taken to the list.
John will revise this draft within 2-3 weeks.
QoS Policy Schema - John Strassner
This draft appears as a 00 draft because it has just moved from the individual namespace to the working group namespace. It has had 3 major iterations previously.
It is acknowledged that another revision needs to be made. First, in separating out concepts that were generic that were used to build the QoS Policy Information Model, not all of the generic concepts have been extracted. Second, it needs to be revised to include a formal ABNF, and to synchronize again against the core information model (simple) and schema (a little bit more work).
This draft has received a lot of previous attention. It was the original source for the concept of policy repositories, and contributed this and other concepts to the PCIM and Core Schema documents. This revision has had the following changes:
- generalization and simplification of the containment model
- generalization and simplification of the implementation of reusable object repositories
- qosPolicyRule class removed, now using policyRule
- QoS domains and policyGroups can be arbitrarily nested
- Action classes for DiffServ and IntServ created
- PHB modeling added as separate drafts
- Variable binding definition and pre-defined constants revised and made more granular
Containment is now based on association classes. This hides the difference between attachment and reference. The reusable objects were generalized so that they could reside in any repository. The model was inverted, so that now multiple domains can reside in a repository, with multiple containers in each domain. This is a more flexible and efficient mapping.
The qosPolicyRule class was removed. Instead, the policyRule class defined in the core model was used, and semantics were moved into the condition and action subclasses defined in this draft.
An example was provided that illustrates how a QoS Domain could be instantiated. It stressed the use of DIT containment, and the ability to treat policyRule and qosNamedPolicyContainer objects as siblings. The policyRule priority attribute, along with the qosPolicyRuleMatchMethod attribute, were used to fine-tune the decision-making process that is represented in the QoS domain. A similar example was provided that illustrates the difference between using attachment and reference to form a QoS policy rule.
The open action items are to incorporate some additional minor editorial comments, to finish the ABNF, and to decide on where variables and constants belong. John will revise this draft within 2-3 weeks.
PHB Sets and Mapping - John Strassner
Files: draft-ronc-domain-phb-set-specification-00.txt and draft-ronc-domain-phb-set-ldap-rep-00.txt
We don't really have time to go into any real detail on these, please read the drafts and comment. The purpose is to extend the core and QoS policy information models and associated schemata by representing a set of PHBs enforced on a QoS domain. This manages the scheduling and resource allocation that is shared between the set of PHBs that are enforced together on a QoS domain.
Device QoS Information Model - Walter Weiss
This is a 00 draft, but represents a major restructuring and refinement of the previous draft. It focuses on creating data structures for configuring and managing QoS mechanisms that are "in" a device.
The first slide talks about the same three levels of policy. Again, there is a continuum of policies that start by being defined administratively, then get translated to a device- and mechanism-independent form, and then get translated again into a device-independent but mechanism-dependent form.
Mechanism-independent policies talk about ports and DSCP values. Mechanism-dependent policies talk about classifiers, markers, and other elements that affect the forwarding of traffic in the data path of a router.
There is an important implication here. One of the problems of the mechanism-independent approach is that it can't guarantee interoperability between different devices. That is, consider a single policy server. If it controls two different devices that each have different implementations of the same QoS mechanism (e.g., a dropper or queue), then these devices will interpret the policy differently UNLESS there is a common device information model.
Similarly, mechanism-independent policies do not guarantee interoperability between policy servers. If you have multiple policy servers from different vendors, then you have a different set of problems: each policy server defines its own mapping to control devices, but you have no assurance that the policy servers are doing the same thing.
How do we support the different types of mechanisms? Our approach is to use a class hierarchy. This provides a set of abstractions that each can model one or more concepts in detail. This makes the model inherently simpler, more accurate, and more extensible than building a single monolithic model that describes everything. The higher portion of the hierarchy talks about common information, and as you move down the hierarchy, you refine these higher concepts to model mechanism-specific or even device-specific policies. An example from the model that describes droppers was given, where a superclass represents information that is both device-independent and generic. Its immediate subclasses refine this to contain more specific information (RED vs. tail-drop characteristics). Note that this level is still device-independent. A further level can be defined, which subclasses the RED and tail-dropper classes to bind a specific vendor implementation to them.
Class Associations are used to specify relationships between QoS mechanisms and services. These take several forms. One example is the construction of a generic QoS service from specific technologies, such as DiffServ or 802.1Q. Note that these technologies are modeled as sub-services that work together to implement a service. Another example is the definition of a TCB (traffic conditioning block) service. This service is made up of various sub-services, such as marking, classifying, metering, etc. A third example, nextTCBElement, is used to control the sequencing of various TCB sub-services.
Note that associations are implementation-independent. They can be mapped to a row pointer if using a MIB, or a DN if using a directory.
Another idea in the draft is to specify at run-time (or when the policy needs to be processed or interpreted) the characteristics of the device that are applicable, so that the best possible mapping can be done. Sometimes, you run into capacity problems (e.g., device can only support 50 filters) or specific technologies (does this device support DSCP marking?) or specific implementation (does this filter support bit masks and ranges?). These are called capabilities. Capabilities enable us to bind policy to device-specific characteristics. Examples were given that show how capabilities and constraints can be used to achieve a closer model of how the device is operating in the real world.
The QoS Model has two parts - description of QoS services, and description of mechanisms in the device. QoSService is an instance of (for example) Gold Service, and its associations enable specific sub-services (e.g., classifiers and markers) to be used to provide this service.
Three examples of different types of services were provided. A DiffServService binds DSCPs to TCBs in order to construct the DiffServ service. An 802.1P service binds priority values to TCBs in order to construct the service. Finally, Gold Service can be conceptualized as an instance of QoSService that could use services like the ones above to specify a customized QoS definition. This definition consists in reality of multiple services that are coordinated together (e.g., EF for voice, and AF for data).
Q: Don't see policies that govern admission control
A: This is governed by the TCB components.
Q: No, I mean explicit admission control (controlling interaction of devices to limit the number of conversations that can take place
A: Nothing in the model precludes modeling this, but we need more work in this area
Q: What about modeling voice?
A: We support this, it's actually similar to the Gold Service example. You'd create an instance of QoSService
Q: how do we use this to configure devices, and how does it relate to the core model?
A: the QoS Device info model defines attributes that you can use to configure mechanisms (e.g., RED droppers). The QoS Info model provides the structure that encapsulates this information. It's up to you if you want to use policies to control this information or some other means. But the information is defined in both cases by the Device QoS Info Model.
Note: this is not a completed model. So, it's not that we can't or don't want to model certain policies, we just haven't gotten there yet.
Hugh - Policy Requirements Document (now 3 drafts)
www.users.uswest.net/~hmahon/ is the common prefix.
Changes in Requirements draft. This was split into 3 drafts in response to feedback from the community. The first draft (draft-ietf-policy-req-02.txt) is just the requirements. Draft-mahon-policy-mgmt-00.txt and draft-mahon-policy-use-00.txt talk about how policies are managed and use cases, respectively. Also, tried to remove implementation information and in general tried to cut down the draft size.
Discuss situation in which policy would actually be used (e.g., why are people interested in policy management). Three examples are VoIP, protect certain classes of traffic from other classes of traffic, and to guarantee transfer time.
Usage cases. New usage cases are a variation of Olympic service in an ISP environment (customers connecting to an ISP, where the ISP is repsonsible for delivering different classes of service based on who the customer is). Second example is Olympic service in an intranet. This is similar to the first usage case, and both concentrate on how traffic is to be marked and how traffic is deployed.
Policy information is not the same as a description of service.
Need for rapid notification of changes to policy. Despite the fact that policy is relatively static, it is a must that policy information be delivered quickly (e.g., security, fix a broken link, etc.). The point is that ven though policy doesn't change very much, when it does change, it usually needs to be deployed quickly.
Methods for identifying traffic other than port numbers and IP addresses is mandatory.
Better, more complete information about the managed environment needs to be available in a standardized way.
Security section of the document is changed to include authorization, as opposed to just authentication, as mandatory requirements.
Can continue to add more information, but is there a specific direction that people would like the drafts to go? One suggestion is to describe what need to be done by the administrator to manage QoS in the environment, and then describe the requirements to support those activities.
Hugh thinks that the requirements and usage cases can help guide the next revision of the Policy Framework document in helping to continue to make the framework more robust and complete. Yoram adds that one specific requirement that has not been addressed in the framework are general signaling requirements.
Policy Management Scalability - Hugh Mahon
Topics in this draft are why we're concerned about scalability, what types of things we need to think about when build a policy management system, and what are the implications in managing the policy management database.
Need to manage large numbers of nodes at which policy is deployed. But the problem is that nodes exist at numerous locations, across multiple domains (e.g., administrative domains within a company, etc. as well as different types of policies, and who can govern/use which policy). In addition, there is lots of information that needs to be combined to form a policy, as well as different types of information.
Need to conside type as well as locality of policies. Using a hierarchy of policies can significantly simplify the management domain.
Topology can be used to restrict the number of resources, entities and/or people that need specific entries in the policy database by using hierarchies of policies and repositories to distribute the information
Need to understand the frequency of access of the repository and its availability, and then design
Need to create a partitioning of data...
Q: You mentioned partitioning, rules, secondary servers, and other similar things. This sounds like fundamental concerns for modeling as well as schema design. Seems like this should be folded back into the requirements draft (at least). Where do you see the work going?
A: Good question. Problem is that there is a lot of things to consider. The question is how much of the discussion as to why these are requirements should go back into the requirements draft vs. staying outside.
Comment: Seems like this crosses the info model draft as well as the framework
Two things need to be added. One, the operational aspects of the device info model and the QoS info model need to be documented - this seems to belong in the framework doc. The other is how this info model interacts with CIM (for example).
QoS Policy Info Model
QoS Policy LDAP Schema
Information Model for describing network policy and services
Domain PHB Sets Specification & LDAP schema
Qos Policy LDAP Schema