⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc3052.txt

📁 最新的RFC
💻 TXT
📖 第 1 页 / 共 3 页
字号:
RFC 3052            Service Management Architectures        January 2001   elusive with many of the terms being used having their roots in the   telecommunications industry and as such being of potentially limited   use for IP management [1].  Confusion resulting from the ambiguity   associated with what functions compose management beyond those   intended for the element, is compounded by the broad scope for which   network and service management standards apply.  Terms such a   business goals, service management, and application management are   not sufficiently defined to insure there will not be disagreement as   to the actual scope of the management functions needed and to what   extent interrelationships will exists between them.   It is within this hazy domain that much of the recent efforts in   rules-based management have been proposed as a potential solution.   Efforts to devise a framework for policy management is an example of   one of the most popular recent activities.  Proposed requirements for   policy management look very much like pre-existing network management   requirements [2], but specific models needed to define policy itself   and related to the definition of policy to control DiffServ and RSVP   based QoS are under development.2.3. Service Management Requirements   Efforts to define the requirements for a service management system   are hindered by the different needs of network operators.  In an   industry where much has been written about the trend towards   convergence there still exist fundamental differences in the business   needs of operators.2.3.1. Enterprise   The management requirements from both the operations and the network   perspective have some interesting characteristics in the enterprise   environment when compared to the public network.  In the enterprise   end to end traffic management is implemented without the burden of   complex tariff issues.  Service Level Agreements, while increasing in   the enterprise, do not have the same operations impact as in the   public network.  The high costs associated with implementing non-   reputable auditing systems are usually not present.  This results in   a substantial reduction in the number of expressions necessary to   represent a particular networks business model.   In the world of best effort service, rules-based management presents   the possibility to give the IT department a tool the make the network   appear to not be overloaded by prioritizing traffic.  This is done by   prioritizing delay sensitive traffic (Web browsing) from traffic that   is not delay sensitive (Email) or by prioritizing the traffic from a   particular location or source.  This will, depending on the composite   of an enterprises traffic, increase the useful life of the networkEder & Nag                   Informational                      [Page 5]RFC 3052            Service Management Architectures        January 2001   without adding additional capacity.  This does not come without   tradeoffs.  Both the purchase and management costs associated with   the system must be calculated as well as the cost of the added   complexity of adding additional control information to the network.2.3.2. Service Provider   It has for a long time been a goal of service providers to have a   centralized management system.  While the motivation for this is very   straightforward there exist some fundamental obstacles in achieving   this goal.  Service providers often do not want to be tied to a   single vendor and certainly do not want to be limited to only one   model of any single vendors equipment.  At the same time bottom line   costs are of paramount importance which often result in networks not   being as heterogeneous as operators would like. Centralized   management implies a scalable system able to manage potentially many   heterogeneous pieces of equipment.  The amount of data necessary to   achieve this is contrary to the scalability requirement.  In response   to this problem it has been attempted many times to identify the   common model that represents the subset common to all devices.   Unfortunately all too often this set is either too complex,   increasing the cost of devices, or too limited to preclude large   amounts of device specific data thus defeating the purpose. For such   a management model to be successful at the service level, the   services being modeled must be standardized.  This is counter   intuitive to the competitive model of which the service provider   operates.  To be successful speed to market has become a key element   that differentiates one service provider from another.  Constraints   placed on equipment manufacturers and the management infrastructure   by a centralized management system are also detrimental to this goal.   While for a limited set of well defined services a central management   approach is feasible, such a system can very quickly become a major   contributor to the very problems it was intended to solve.3. Network and Service Management   Currently many of the efforts to define a framework for management   are described in very implementation independent terms.  In actual   fact the implementation of that framework directly affects for what   situations the management system will be most beneficial.  While many   past attempts to define a common management framework have failed it   may be in the area of service management that such efforts finally   gain industry acceptance.  It may be in the domain of service   management that information models can be defined that are   sufficiently specific to be useful and at that same time not have a   negative impact on the equipment or service providers business needs.Eder & Nag                   Informational                      [Page 6]RFC 3052            Service Management Architectures        January 2001   This section will discuss some of the issues that need to be resolved   with regards to a service management framework to meet the   requirements of the modern IP network.   Some of the key concerns looking at a management system architecture   include:      -  The management interface and models supported      -  The management system architecture      -  Where and how functionality is realized3.1. Architecture for information management   Networks will consist of network elements that have existed prior to   efforts to define a standard information model, rules-based or   otherwise, and elements deployed after.  This problem has been   addressed by some of the recent efforts in policy management.  Those   elements that take into account policy are termed policy aware while   those that do not are termed policy unaware.  The distinction being   made that aware devices can interpret the policy information model or   schema.  These issues apply equally to other standard management   information.  In reality it is unlikely that any device will be fully   policy aware for long, as the policy information model evolves, early   devices will be only policy aware for those aspects of the model that   had been defined at the time.  Key to success of any management   framework is ability to handle revision and evolution.  A number   methods exists provide this functionality.  One is designing the   information models so that it can be extended but still be   practically used in their original form.  A second is to provide an   adaptation or proxy layer.  Each has advantages and disadvantages.   Methods that attempt to extend the original model often overly   constrain themselves.  Where the existing model cannot be extended   new branches must be formed in the model that contain core management   functionality.   Adaptation methods can create performance and scalability problems   and add complexity to the network by creating additional network   elements.  A similar situation exists if the management framework is   so flexible as to allow network elements to store locally information   or choose to have information stored remotely.  From a device   perspective, the criteria will be if the device can afford the logic   based on other requirements it is designed to meet, and if the   information can be retrieved in such a way as to support the   performance and scalability requirements that are the subject of the   information.  A dichotomy exists where there will be information that   for reasons of performance and scalability will be transferred   directly to the network elements in some situations, and in otherEder & Nag                   Informational                      [Page 7]RFC 3052            Service Management Architectures        January 2001   situations, will exist in the management plan.  IP management efforts   have left the level of detail needed to define the actual location of   the management information to the implementation.  In a service   management framework it may be necessary to achieve the desired   results to supply a more complete framework along the lines of detail   provided by the ITU-T telecommunications management network efforts   where the interfaces and functionality across interfaces has been   clearly defined.   Information will need to exist in multiple locations simultaneously   in any network architecture.  As the quantity and complexity of that   information increases limitations quickly develop.  Changes in the   information may need to be propagated in close to real time, further   adding to the complication.3.1.1. Rules-based Management   A network management framework can be viewed as being divided into   two essential functions.  The first deals with the aspects of   managing the management information while the second deals with the   aspects of transferring that management information into the network.   The fundamental difference between rules based management and   existing network management standards is that the management   information is expressed as rules that reflect a desired level of   service from the network as opposed to device specific management   information.  Many of the information management requirements of   traditional management systems still apply in a rules-based   environment.  The network is composed of specific devices and it is   at the point where rules are conveyed as device specific management   information that this form of management will encounter some of its   greatest challenges.  A necessary component of a solution to this   problem will be a generic information model to which rules can be   applied and a framework architecture for distributing rules   throughout the network.  The task of finding the proper generic model   that is not too great a burden to implement and yet provides a level   of detail sufficient to manage a network has proved to be   historically extremely difficult.  In many ways the degree to which   rules based management will be able to solve management problems is   dependent on the success of efforts to define a generic model and   have it be widely implemented [1].   One concept often discussed along with policy deals with the   integration of legacy devices into the policy framework.  The   presumption is that legacy devices would be able to participate in   the policy decision by having policy information translated into the   native management interface.  For this to succeed a device would have   to support a functionality for which policy would be specified. This   would limit the usefulness of this approach to only informationEder & Nag                   Informational                      [Page 8]RFC 3052            Service Management Architectures        January 2001

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -