+ All Categories
Home > Documents > Agent Technology for Network Management - University of Maryland

Agent Technology for Network Management - University of Maryland

Date post: 03-Feb-2022
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
23
©Telcordia Technologies, Inc. Stuart Wagner [email protected] Sudha Ramesh [email protected] Keith Landgraf [email protected] An SAIC Company Agent Technology for Network Management LTS October 10, 2002
Transcript
Page 1: Agent Technology for Network Management - University of Maryland

©Telcordia Technologies, Inc.

Stuart [email protected]

Sudha [email protected]

Keith [email protected]

An SAIC Company

Agent Technology forNetwork Management

LTS

October 10, 2002

Page 2: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 2©Telcordia Technologies, Inc.

Outline

�Some mobile agent basics

�Motivation for their use in network management

�Specific examples of what mobile agents may be able to do for us

�Key research issues: major questions and challenges in implementing agent-based network management

LTS

Page 3: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 3©Telcordia Technologies, Inc.

�A software object that can be dynamically replicated, dispatched to and retracted from network elements

– not hard-coded into network-element software

� Its goals are established by the agent management system; it makes decisions and takes actions autonomously in pursuit of these goals

– can obtain its own thread of control on host network element

�The attributes of the agent and the agent management system vary with the application

What is a Mobile Agent (MA)?

LTS

A Loose, Operational Definition

Page 4: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 4©Telcordia Technologies, Inc.

Traditional NetworkManagement System

database

Adaptors

Agent Creation andManagement System

Mobile Agent Illustration

A

A

LTS

Page 5: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 5©Telcordia Technologies, Inc.

�Many papers, some dating back >10 years

�Papers have offered much conjecture on the benefits of MAs for network management, principally:– reduction in data traffic related to network management

– better scalability resulting from a more-distributed network management paradigm

�The claims are unsubstantiated and remain dubious

�The REAL value may be in providing carriers with greater flexibility in network-management capabilities– filling gaps in conventional management functionality

– facilitating speedy support of new services and features

Prior Research: MAs for Network Management

LTS

Page 6: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 6©Telcordia Technologies, Inc.

Our Research Goals

�Demonstrate MA-based network management functionality in a testbed environment

�Develop a detailed understanding of what it takes to implement a MA infrastructure

�Assess the relative value of the mobile-agent approach compared with conventional methods– Compare the “gain” with the “pain” of an MA-based system

�Draw conclusions on whether, how and where carriers are likely to use MAs

�Difficult to do in general terms; use specific network examples and case studies to gain insights

LTS

Page 7: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 7©Telcordia Technologies, Inc.

Network Example - Metro Ethernet

LAN 1

LAN 2

LAN n

• • •

Multi-tenant Building

GbE L2Switch

AccessRing

Metro/Regional Network(GbE/10GbE Core)

Data StorageFacility

ISP Pointof Presence

AccessRing

VoIPGateway

Web Hoster

GW

LTS

Page 8: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 8©Telcordia Technologies, Inc.

Why Focus on Ethernet?

�The low cost and IP-friendly nature of Ethernet hardware make it attractive to carriers

– Major Government agencies are planning large-scale Ethernet deployments

– Pacific Rim countries buying thousands of Ethernet switches for Metro-area applications

– Domestic carriers have issued requirements for Metro Ethernet networks (both hardware and network management)

– ISPs increasingly peering with each other at Layer 2

�However, managing large-scale Ethernet networks is an unsolved problem and presents many challenges

LTS

Page 9: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 9©Telcordia Technologies, Inc.

�Ethernet’s roots are in enterprise networks– carrier-grade network management capabilities are lacking

– hardware continues to evolve to meet carriers’ needs

�Ethernet switch configuration (e.g., via CLI) is labor-intensive, slow and error-prone

�Ethernet is connectionless– carrier cannot directly control traffic routes, similar to

conventional IP networks without MPLS

– Ethernet’s reaction to network faults can be unpredictable

Metro Ethernet Management Challenges

Ethernet hardware is economical, but inadequate NMcapabilities have impeded large-scale carrier deployment

LTS

Page 10: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 10©Telcordia Technologies, Inc.

Example MA Applications in Metro EthernetAuto-Discovery

Agent Creation andManagement System

A

� Notify network management of changes to switch configuration....� Discover and report all spanning tree routes...� Discover and report all VLAN topologies...

LTS

Page 11: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 11©Telcordia Technologies, Inc.

Example MA Applications in Metro EthernetVLAN Configuration

Agent Creation andManagement System

A

� Configure a VLAN with the following ingress/egress points and QoS parameters...� Create a spanning tree for this VLAN with the

following route...LTS

Page 12: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 12©Telcordia Technologies, Inc.

Example MA Applications in Metro EthernetService Validation and SLA Management

Agent Creation andManagement System

A

� Verify the following configuration settings along the path of VLAN XYZ, and report discrepancies� Collect and report jitter and packet-loss statistics on

VLAN XYZLTS

Page 13: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 13©Telcordia Technologies, Inc.

Example Platform: Anchor Toolkit/AkentiLawrence Berkeley Labs

A A

Anchor ServerAnchor Server

SSL

AkentiPolicyEngine

POLICY IDENTITY ATTRIBUTES

AgentSecurityManager

Interceptor

LOCAL RESOURCES

JVMHost 1

JVMHost 2

AccessValidation

Page 14: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 14©Telcordia Technologies, Inc.

Example Platform: JiniSun Microsystems

ServiceProvider

LookupService

Client

ServiceObject

ServiceObject

ServiceObject

RMI ServiceObject

Agent Creation and Management System

Managed Network Element

Page 15: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 15©Telcordia Technologies, Inc.

Other Agent Systems – A Sampling

� Commercial– Aglets from IBM– AgentBuilder from IntelliOne Technologies– GrassHopper from IKV++ Technologies

� Academic & Research– D’Agents from Dartmouth University– Mobile Code Toolkit from Carleton University– Hive from MIT– JATLite from Stanford University– JADE from CSELT, Italy– FarGo from Isreal Institute of Technology– Ajanta from Univ. of Minnesota– MAgNET from UCSB

Page 16: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 16©Telcordia Technologies, Inc.

Key Questions to Address

�Will network elements accommodate MAs easily?– code loading, Java Virtual Machines (JVMs)

�How does one maintain control over MA actions?– limiting authority and access to network-element resources– authentication of MAs

�How many MAs are needed in a network?– should they replicate themselves, or should we use a

“centralized create, dispatch and retrieve” model?

�How mobile do the MAs have to be?– single-hop vs. multi-hop/roaming capability

�Do MAs need to communicate with one another?�How intelligent can/should we make the MAs?

Page 17: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 17©Telcordia Technologies, Inc.

Accommodating MAs

OperatingSystem

AccessControl

Adapter

JVM

SwitchHardware

MIB

A

MIB = Management Information Base

AgentReceptor

Direct Support on Switch

Page 18: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 18©Telcordia Technologies, Inc.

OperatingSystem

AccessControl

Adapter

JVMSwitch

Hardware

MIB

A

CLIcommands

Accommodating MAsUse of External Receptor

Page 19: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 19©Telcordia Technologies, Inc.

Security

�Little work done on security of MA systems– Important issues are:

• Protect Host from an Agent–Authenticate an incoming agent–Verify security of the information it carries–With active agents, agent is probably running before you

can authenticate. How do we deal with this?• Protect Agent from the Host

–How can the agent trust the host?–No easy solutions for this

• Protect agents from one another –This is very difficult

• Limit and eventually terminate the agent’s power to act on behalf of the network management system

Page 20: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 20©Telcordia Technologies, Inc.

Security - continued

�Most proposals use Java security apparatus– Addresses only the rogue agent problem

• Authenticate the agent

• Limit its access to protected local resources

– Does not solve other problems

�Some (Anchor/Akenti) enhance security provided by Java, principally: – Enforce security policies by using interceptors which override

Java default mechanisms

– Use secure encrypted communication between agent servers

Page 21: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 21©Telcordia Technologies, Inc.

Number, Mobility and Intelligence of MAs

� Two extreme cases:1. a single MA hops around the network looking for XYZ

2. separate MAs are dispatched to each machine to look for XYZ; information sent to centralized management system

� Case (1) requires a more-sophisticated agent that makes mobility decisions and carries its own data

� Case (2) requires only single-hop mobility and minimal agent intelligence

– agents act as relatively simple probes while a highly shared management system does the processing

– Jini-like model; minimizes demand on switch CPU

Example Task: Discover the topology of VLAN XYZ

Page 22: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 22©Telcordia Technologies, Inc.

Inter-Agent Communication

Agent Creation andManagement System

A

1. Agents communicate directly with each other

LTS

A

2. Agents communicate indirectly, through mail boxes or a proxy server

3. Agents communicate only with management system

Three Options

Page 23: Agent Technology for Network Management - University of Maryland

SSW - 10/10/02 23©Telcordia Technologies, Inc.

�One can envision many feasible combinations of MA attributes

– the best combination may depend on the network management task to be performed

�Developing appropriate metrics may be one of the biggest challenges

– how do we compare the relative merits of different MA implementations?

– how do we know if the MA approach is better than conventional network management techniques?

– can we develop metrics that accurately reflect what really matters to the network operator (e.g., complexity, cost)?

Observations

LTS


Recommended