10 Annex 2
10 Annex 2
On the Future of
Internet Management Technologies
Jürgen Schönwälder, International University Bremen
Aiko Pras, University of Twente
Jean-Philippe Martin-Flatin, CERN
configuration
configuration
configuration
configuration
configuration
figuration data in a logically centralized
database, as depicted in Fig. 1 [4]. Change
Device
Device
Device
Device
Device
requests leading to configuration changes in net-
work devices (e.g., new routing policies) trigger
transactions on the logically centralized database.
Once a new network-wide configuration has
been established in the database, complete con-
figuration files or incremental configuration ■ Figure 1. A configuration management model.
updates for specific network devices are first
generated by a configuration data translator, MANAGEMENT ENVIRONMENT
then distributed to all devices, and finally acti-
vated. It is not unusual for Internet network The SNMP framework was designed to:
operators to write these translators themselves. • Minimize the number and complexity of
Due to a lack of well established standards, net- management functions realized by the
work operators have to update their translators agents
when new network devices are released, or when • Be extensible to accommodate additional
new firmware needs to be installed in already and unanticipated aspects of network oper-
deployed devices. ation and management
The requirements of the Internet network • Be as much as possible independent of the
operators can be summarized as follows: implementation of particular hosts or gate-
• It is crucial to make a clear distinction ways [5]
between configuration data (which is rather As a result, the main strengths of SNMP are its
static) and data that describes operational simplicity, interoperability, and low footprint on
state (which is dynamic by nature). agents [6].
• There must be basic operations to download SNMP must also work effectively when the
and upload complete configuration files. It network is not fully operational. This reflects in
is desirable to be able to download or the selection of a connectionless transport proto-
upload only parts of the configuration data. col (UDP), which allows management applica-
• The configuration data should be in a textu- tions to exercise full control over the
al format to allow the usage of a wide range retransmission strategy.
of text-processing tools (e.g., the UNIX Another design choice was to keep SNMP as
command diff) and version management independent as possible of other network ser-
systems. vices. This is one of the main reasons why, in
• It is necessary to distinguish between the SNMP version 3 (SNMPv3), security is self-con-
distribution of configurations and the acti- tained and does not rely on other external secu-
vation of a certain configuration. Devices rity services such as key exchange or certification
should be able to hold multiple configura- services.
tions and enable management applications But the environment in which management
to activate any of them (only one configura- operations take place has dramatically changed
tion is active at a time). since SNMP was devised. Looking at today’s net-
• The coordinated activation of configura- work technologies and the actual usage patterns
tions could be dramatically simplified by of SNMP, it is obvious that devices could per-
having a transaction mechanism for upload- form more complex management operations at
ing new configurations and activating them low cost. It is reasonable to expect that devices,
“simultaneously” on multiple devices. Such especially high-end routers and switches, will
a transaction mechanism must take into become increasingly programmable, and that it
account that connectivity might be lost in will become possible to execute more control
the middle of the transaction. software directly on the devices.
• Finally, ease of use of the management Furthermore, as described by Wellens and
technology is of paramount importance. Auerbach [7], SNMP need not use UDP. When
Configuration management interfaces must network connectivity is lost, non-SNMP mecha-
be designed such that developing and nisms are usually used to bring back connectivity
debugging configuration data translators is before management operations can resume.
cost effective. Finally, SNMP was standardized at a time
Instrumentation
Management main building block, the Common Information
Rendering daemon
Model (CIM). CIM schemas define management
information for users, applications, networks,
XML systems, events, policies, and so on. They are
XML parser
defined in a language called Managed Object
Format (MOF) and can be viewed in the form
of UML class diagrams. To transfer manage-
ment information over the wire, WBEM uses
■ Figure 3. The structure of the agent's implementation. XML encoding.
Despite the fact that a number of vendors
have been working on XML-based management
access control — especially if other protocols for several years, the traditional Internet man-
such as FTP or HTTP are used for the actual agement community (IAB and IETF) has
bulk data transfers. ignored it for a long time. Activities in this area
The first two options generally benefit from were limited to those of the NMRG, where a
larger PDU sizes. The default SNMP over UDP mapping from SNMP MIB modules into XML
transport only guarantees the transport of SNMP Document Type Definitions (DTDs) was defined
messages of a size up to 484 bytes, which is too [8] and an XML-based management application
small for bulk data transfers over most layer 2 prototyped [6].
technologies. The NMRG therefore defined a The situation has changed, however. At the
transport mapping for SNMP over TCP to allow June 2002 IAB workshop, one of the interesting
for larger SNMP messages with a minimum conclusions was the unanimous support to inves-
guaranteed message size of 8192 bytes [11]. tigate XML-based network management. At the
As in the SMIng case, the EOS WG could 54th IETF meeting in Yokohama, Japan, there
not reach consensus on the proposals and was was also a well-attended Birds of a Feather
closed down in April 2003. (BOF) meeting to discuss the use of XML in
configuration management. As a result of this
COPS-PR AND SPPI interest, a new WG called Network Configura-
The IETF Resource Allocation Protocol (RAP) tion (NetConf) was formed in May 2003.
WG defined the Common Open Policy Services Independent of standardization, some ven-
Protocol — Policy Provisioning (COPS-PR) pro- dors already support XML-based management
tocol [12] and its associated data definition lan- in their routers.
guage, the Structure of Policy Provisioning
Information (SPPI) [13]. COPS-PR was designed JUNOSCRIPT
to provision complex and continuously changing In January 2001, Juniper introduced its JUNO-
device configurations generated from policy- Script application programming interface (API)
based management systems. for the JUNOS network operating system [14].
The design of COPS-PR addresses well-known This API gives management applications full
issues in SNMP. In particular, COPS-PR uses access to the agent’s management data using a
TCP as its transport, which makes it possible to lightweight remote procedure call (RPC) mecha-
support large message sizes and use transport- nism encoded in XML. As opposed to SNMP,
layer security mechanisms. COPS-PR also assumes JUNOScript uses a connection-oriented trans-
that only one entity can have exclusive control for port mechanism (e.g., ssh or telnet). A major
a given subject category on a device. This assump- advantage of this approach is that related man-
tion makes it easier to share state between man- agement interactions can be grouped into ses-
agers and agents, and thus reduces complexity. sions, which makes locking and recovery
The SPPI language is a variant of SMI adapt- relatively simple. In addition, management infor-
ed to COPS-PR. It does not support SMIng fea- mation is no longer limited in size and can be
tures such as complex nested data types. In fact, exchanged reliably.
the release of SPPI was one of the motivations Figure 3 shows the internal management
to develop a protocol-neutral data definition lan- structure of a Juniper router. It is interesting to
guage within the NMRG. note that the Command Line Interface (CLI)
So far, COPS-PR and SPPI have failed to and XML interface rely on the same pieces of
gain significant market acceptance. One reason software. The main difference between the two
is that Internet network operators are concerned is that an additional rendering component is
about the increased complexity and maintenance needed for the CLI to translate between the
costs associated with yet another management human-readable CLI interface and the more ver-
technology, which only partially fulfills their bose XML-based messages. It is possible to
requirements. Another reason is that these pro- switch rendering off with a single command,
tocols only provide minor improvements over which may be useful for debugging purposes.
SNMP, which could easily be integrated into the Although there are many XML parsers on the
SNMP framework. market today, Juniper decided to implement
their own parser for performance reasons. This
parser understands only a subset of XML.
XML-BASED APPROACHES Interactions between a manager and an agent
XML-based management has been around for are based on XML messages, which can be
several years now. One of the pioneers in this regarded as RPCs. Although several XML-based
area is the Distributed Management Task Force RPC standards already exist (e.g., XML-RPC),