Agenda - Catatan Hasdi Putra

Download Report

Transcript Agenda - Catatan Hasdi Putra

POSTEC Lecture
Network Management
Chapter 4 SLA and QoS
May 6-27 , 2008
Masayoshi Ejiri
Japan
1
Agenda
1.
ICT Operations and Management
- Service Industries
- ICT Services and Networks—
- Target of the Management
2, Architecture ,Function ,Information Model and Business Process
- ITU-T TMN( Telecommunications Management Network)
- TeleManagement Forum Telecommunications Operations Map ( TOM)
- Multi domain management and System Integration
- Standardization
3. OSS( Operations Support System ) Development
- Software Architecture ,Key Technologies and Product Evaluation—
4. SLA( Service Level Agreement) and QoS( Quality of Service)
- SLA Definition , reference point and policy based negotiation
5, IP/eBusiness Management
- Paradigm shift , Architecture beyond TMN and enhanced TOM
6. NGN( Next Generation Networks) Management
- NGN Networks and Services , New Paradigm of ICT Business and
Management
2
Agenda
•
•
•
•
•
•
•
•
Service Life cycle of QoS/SLA
IP QoS and network performance
QoS , QoE and SLA
SLA and OLA Overviews
SLA Management
SLA Features
SLA Negotiation
Security
3
Service Life cycle and QoS/SLA
• ITU-T Recommendation M.3341
Requirements for QoS/SLA management over the TMN
X-interface for IP-based services
Management of QoS and associated SLAs require interaction
between many telecom operations business processes and TMN
management services as defined in ITU-T Rec. M.3200 and TMN
management function sets as defined in ITU-T Rec. M.3400.
4
M.3341 – Service life cycle (Figure 5-1/GB917)
Product/service
development
Negotiation
and sales
Implementation
Execution
Assessment
Develop templates
and parametric
boundaries
Negotiate
individual
contracts
Take line/service
orders and
provision
Monitor,
surveillance,
maintain, bill
Reassess
M.3341_F5-1
•Service product planning and development;
•Negotiation and sales of a service product;
•Implementation (configuration, provisioning and commissioning) of a service product;
•Operation and maintenance of a service product;
•Periodic assessment of the QoS of a service and whether it meets the SLA.
5
QoS/SLA management interactions
across QMS interface M.3341
SC( Service Customer) initiated:
•
•
•
•
•
•
•
•
Retrieve MPs MP : Measurement Point
Retrieve Obs Ob : Observation
Configure Ob
Assign PM data collection interval PM : Performance Management
Suspend/Resume PM data collection
Reset PM data
Assign PM history duration
Assign PM threshold (including severity)
• Request PM data (current or history)
SP( Service Provider ) initiated/provided:
•
•
•
Report MP configuration changes
Report SP suspension of PM data collection
Report PM threshold violation
QMS : QoS/SLA Management Services
6
Measurement point and observation
M.3341
The observation provides QoS measurements from the ingress to the egress
of the ISP's network regardless of the service providers or network operators involved.
ISP
TSP
SC
TSP
NO
MP-a
NO
MP-b
MP-c
NO
MP-d
MP-e
NO
MP-f
MP-g
SC
MP-h
M.3341_F3-1
Observation
MP Measurement Point
SC :Service Customer
NO :Network Operator
TSP: Telecommunications Service Provider
ISP: Internet Service Provider
7
IP QoS related Y series . Recommendations
• Y.1540
Internet protocol data communication service –
IP packet transfer and availability performance
parameters
• Y.1541
Network performance objectives for IP-based services
Note : SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE,
INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION
NETWORKS
Internet protocol aspects – Quality of service and network
performance
8
Rec. Y.1540 – Layered model of performance for IP service – Example
Higher layer
performance
User information
(e.g., data)
User information
(e.g., data)
(HTTP)
(HTTP)
(RTP) (FTP)
(TCP)
(UDP)
etc.
(RTP)
(FTP) etc.
(UDP)
(TCP)
IP packet
Layer service
performance
Y.1540
IP layer
Lower layer
performance
(3 instances)
Network
components:
IP layer
LL
SRC
Link
IP layer
LL
Router
Link
IP layer
LL
Router
Link
DST
Y.1540_F02
SRC : Source host
DST : Destination host
9
Services in ISO 7 layers Model
Human/Business
•
•
•
•
•
•
•
Application service
Layer 7 : Application
Presentation service
Layer 6 : Presentation
Session service
Layer 5 : Session
Transport service
Layer 4 : Transport
Network service
Layer 3 : Network
Data link service
Layer 2 : Data link
Physical service
Layer 1 : Physical
10
Generic IP Service performance model :
IP Network Connectivity Y.1540
ER
C
(more NS and EL)
D
ER
ER
ER
ER
ER
B
ER
ER
A
SRC
source NS
ER
ER
ER
F
DST
G
destination NS
(more NS and EL)
ER
(more NS and EL)
E
Network Section (NS)
Exchange Link (EL)
ER
Y.1540_F04
Edge Router
11
Y.1541 – UNI-to-UNI reference path for network QoS objectives
12
End-to-End QoS
• NOTE – The phrase "End-to-End" has a
different meaning in Recommendations
concerning user QoS classes, where end-toend means, for example, from mouth to ear
in voice quality Recommendations. Within
the context of this Recommendation( Y.1541),
end-to-end is to be understood as from
UNI-to-UNI.
13
Quality evaluation MOS
ITU-T Rec P.800
Listening-quality scale
•
•
•
•
•
Excellent
Good
Fair
Poor
Bad
5
4
3
2
1
The quantity evaluated from the scores (mean listening-quality
opinion score, or simply mean opinion score) is represented by
the symbol MOS.
14
DMOS
Degradation category scale
•
•
•
•
•
5
4
3
2
1
Degradation is inaudible.
Degradation is audible but not annoying.
Degradation is slightly annoying.
Degradation is annoying.
Degradation is very annoying.
The quantity evaluated from the scores (degradation mean
opinion score) is represented by the symbol DMOS.
Note: In non voice services , audible should be perceptible.
15
IP packet transfer performance parameters
REC.Y.1540
Speed ,Accuracy and Dependability
•
•
•
•
•
•
•
•
•
IPTD : IP Packet Transfer Delay
IPDV : IP packet Delay Variation
IPER : IP Packet Error Ratio
IPLR : IP Packet Loss Ratio
IPRR : IP Packet Reordering Ratio
IPSLBR : IP Packet Severe Loss Block Ratio
IPDR : IP Packet Duplicate Ratio
RIPR : Replicated IP Packet Ration
IPPT : IP Packet Throughput
16
IP service availability (REC.Y.1540)
IP Service
Unavailable
Availability
Parameters
IP Service
Available
Unavailability: IP Packet Loss Ration(IPLR) > C1
C1 = 0.75
Availability Parameters:% time ratio
Percent IP service unavailability (PIU)
Percent IP service availability (PIA)
17
Conditions for IP Performance Measurement Rec.Y1540
1)
•
•
2)
•
•
3)
•
•
•
•
4)
•
•
5)
•
•
the exact sections being measured:
SRC and DST for end-to-end measurements;
MP bounding an NSE being measured.
measurement time:
how long samples were collected;
when the measurement occurred.
exact traffic characteristics:
rate at which the SRC is offering traffic;
SRC traffic pattern;
competing traffic at the SRC and DST;
IP packet size.
type of measurement:
in-service or out-of-service;
active or passive.
summaries of the measured data:
means, worst-case, empirical quantities;
summarizing period;
–short period (e.g., one hour);
– long period (e.g., one day, one week, one month).
18
Y.1541 – Hypothetical reference path for QoS class 0
19
Table 1/Y.1541 – IP network QoS class definitions and
network performance objectives
QoS Classes
Network
performance
parameter
Nature of network
performance objective
Class 0
Class 1
Class 2
Class 3
Class 4
Class 5
Unspecified
IPTD
Upper bound on the mean
IPTD (Note 1)
100 ms
400 ms
100 ms
400 ms
1s
U
IPDV
Upper bound on the
1  10–3 quantile of IPTD
minus the minimum IPTD
(Note 2)
50 ms
(Note 3)
50 ms
(Note 3)
U
U
U
U
IPLR
Upper bound on the
packet loss probability
1 × 10–3
(Note 4)
1 × 10–3
(Note 4)
1 × 10–3
1 × 10–3
1 × 10–3
U
IPER
Upper bound
1 × 10–4 (Note 5)
U
General Notes:
20
Table 3/Y.1541 – Provisional IP network QoS class definitions and
network performance objectives
QoS Classes
Network performance
parameter
Nature of network performance
objective
Class 6
Class 7
100 ms
400 ms
Upper bound on the mean IPTD
IPTD
Upper bound on the 1  10–5
quantile of IPTD minus the
minimum IPTD (Note 1)
IPDV
IPLR
50 ms
Upper bound on the packet loss
ratio
1 × 10–5
IPER
Upper bound
1 × 10–6
IPRR
Upper bound
1 × 10–6
21
QoS Control
modified Nakajima’s IM2005 panel presentation
Control
• Admission Control : managed bandwidth
• Fairness Control : minimum bandwidth
• Priority Control : reactive control, priority conflict
Outcome
• Guarantee : with proactive control e.g. pre assigned
resource, on demand reservation,
• Managed Quality : with reactive control
• Best effort : with no active control
22
Definition of Quality of Experience (QoE)
Rec.G100
The overall acceptability of an application or
service, as perceived subjectively by the
end-user.
• NOTE 1 – Quality of Experience includes the complete end-to-end
system effects (client, terminal, network, services infrastructure, etc.).
• NOTE 2 – Overall acceptability may be influenced by user
expectations and context.
23
SLA
-How to reach the practical Agreement by Negotiation ?- ,
•
•
•
•
•
Who drive SLA ?
Why SLA is needed ?
What S.L.A. is ?
When SLA is agreed ?
How to agree SLA ?
24
ITU-T Rec. E860 ( 2002)
• “A Service Level Agreement is a formal
agreement between two or more entities that
is reached after a negotiating activities with
the scope to access service characteristics,
responsibilities and priorities of every part “
25
SLA for IP Management
Public Network / Services
Fixed QoS
IP network / Services
 Negotiated CoS
Network Performance Oriented 
Internal within SP
Human Interface Oriented
 Open and Visible to Customers
<Best Effort SLA Announcement> <Guaranteed SLA Agreement>
Based on embedded
Based on Management
QoS Mechanism
Excellence and Negotiation
26
Service Level Agreement ???
• Service ?
Transport , Contents Delivery, Operation, Billing,etc.
• Level ?
Performance : QoS, CoS, Accuracy, Timeliness, etc.
Treatment : Reliability,Priority, etc.
Value : Absolute, Average in long term/in group,etc.
• Agreement ?
Negotiation, Selection of SLA Package/menu,etc.
Contract : Long term, Call by Call. Specific Call,etc.
27
Guaranteed /Best Effort SLA
• Service Priority ( Class of Services)
: Guaranteed by Policy based Operations
• Static/Average QoS Value
: Guaranteed by NW design/implementation
• Individual or Target Service QoS Value
: Guaranteed by successful Pre-Provisioning/Resource
Reservation
: Best Effort in General
28
SLA Management(Reference Point)
Customer
OSF
Operations Services
SLA
SLA Negotiation
Operator
Communication Services
SLA
Resource
OSF
Service Provider
Operations Support
SLA
SLA Negotiation
OSF
Resources Provisioning
SLA
Partner
29
SLA Management(Monitor/ Report)
Customer
SLA Report, Invoice
SM
CoS
Policy
Mapping
QoS Value/MTxx
NM Aggregate
NE
Resource
QoS Parameter
QoS Events
EM
Operation
QoS Parameter
SM
Partner
30
SLA Management(Control)
Customer
SO,TT,Bill
Treatment
Policy
SM
Mapping
QoS order
NM Analysis
NE
Parameter Control
QoS Control
EM
Operation
Resource
Parameter Control
SM
Partner
31
SLA and OLA Overviews
Customer
( eBusiness)
•Operations Services
SLA
Service
Provider
SLA
Negotiation
Content Delivery
Resource
Transport Services OLA
Transport
Resource
Operations
Resource
Operations Support
OLA
•Content Delivery Services SLA
•Transport Services SLA
OLA
Negotiation
Operations Resource
Supporters
Resource Provisioning
OLA
Communications Resource
Suppliers
Partners
32
SLA Features
• Services
1, Transport Services
2, Contents Delivery Services
3, Operations Services
• Features
1, Fundamental (Performance , Accuracy & Access)
2, RAS(Reliability , Availability & Survivability)
3, Security
33
Operation Services SLAs
-Customer Care Ability• Accuracy & Timeliness
Service Delivery, Report Generation, Handling of
Billing, Call pick up time, Compensation when SLA
violated
• Access Capability
Availability of Contact ( Method, Opening time etc)
• RAS
Human/Organizational structure for provisioning,
Fault & Disaster, Fairness & Priority, Hot line
• Security
Mechanism for Privacy protection, Countermeasure
for Security
34
Transport Services SLAs
-Transport Capability• Performance & QoS
Transmission Quality ( Bandwidth, Delay, Packet loss, Error )
--Average Value in long term and/or in group, Absolute value for
Call by Call or Specific Call—
• Access Capability
Connectivity, Call loss ratio, Call setup time
• RAS
Mean ( Max/min) times between outage, Disaster/Fault
recovery priority
• Security
Access control mechanism, Prevention mechanism for
network attack
35
Content Delivery Services SLA
- Security Assurance CapabilityTransport Services SLA plus
• Security
Prevention mechanism, countermeasure &compensation
--for Access authorization /certification
--for Protection of Content Integrity, Confidentiality,
Authentication, Copyright
36
Classification of SLA Features
Feature Type
Performance
& Accuracy
Access
Capability
Transport Services SLA
- Bandwidth,
- Packet Loss,
- Error rate,
- Delay - throughput
- Connectivity
- Call Loss Ratio
- Call setup time
RAS
Mean time between outages
Disaster/Fault recovery mechanism
Security
Access Control Mechanism
Prevention of Network Attacks,
Eavesdropping, etc…
Operations Services SLA
Accuracy and timeliness of (1)
Service delivery, Report generation,
Etc….
Mean/Max time between call pickup
Compensation when SLA violated
Contact Method – Email, Phone, Fax,
Etc…..
Contact Availability – opening times
Access control mechanism
Hot line
Organisational structure to support
Disaster/Fault recovery
Privacy Protection mechanisms
37
SLA Categories for Customer Preference
Customers
Pick&Mix
SLA
Limited SLA
Define
Default
Define
Class of Service
Negotiated SLA
Proactive
Sales
Market Research
Internal
Negotiation
Operations
Resource
Marketing
Communications
Resource
38
39
40
Service Negotiation
Customer
3. Agreed Service
Resources
OSF
4. Service Report
2. Service
Provision
1. Negotiation
Service Negotiation Function
Status Report
Policy
Pricing
DB
Resource
DB
Class of
Service DB
Traffic/ QoS
DB
Operation
41
SLA Negotiation based on Policy Management
Customers
Policy Descriptor
Negotiation?
Timing
Operators
SLA
Negotiation
Features
Policy Editor
・ Static
• Price
(long term) ・ QoS / CoS
・ Bandwidth
・ Pre
Assigned
・ Delivery Time
・ Security
・ On
Demand
• MTxx
etc.
Policy
Policy Executor
Policy
Repository
OSS
Management
Policy Decision
Function
OSS
42
IT Capable Terminal
Negotiation
NegotiationAgent
Agent
(e.g
Java
applet)
(e.g Java applet)
JVM
Web Browser
etc.
Service/
Resource
Status
Catalogue
Operation
OperationWindow
Window
(e.g
XML)
(e.g XML)
Negotiation
Inquiry
Negotiation
Agent
Customer
Operation
Window
Service Provider
43
For Effective SLA
•
•
•
•
Customer can select SPs
Customer can negotiate/choose SLA
SLA should be reflected Customer Perception
SLA should be Monitored and Reported to
Customers to confirm SLA
• SPs should Compensate if SLA Violation
occurs
44
Security ?
Human/Social
Human/Social
Mechanism
•Life
•Property
•Privilege
•Privacy
•Comfort
•Nation
•Law
•Society
•Communications
•Technology
•Environment
•Disaster
•Goodwill
•Malice
•Indifference
•Credit
•Treachery
•Espionage
Nature
45
Security Management
• Management of Human /Society
Moral, Ethics, Education
Law, Regulation, Community, Privacy, Vigilant ?
• Management of Information distribution/exchange
Safe, secure ,accurate and comfortable ICT network/services
• Management of environment
Prognosis, disaster prevention, environmental preservation
46
IP/eBusiness Security Management
• Network Security
-RAS
-Privacy ( Tapping, fairness , secrecy of
communications, customer information)
-Attack : Physical, Logical
• Information distribution security
-Integrity of contents and delivery
-Human verification, certification , justification
• eBusiness security
ーEnsure real and virtual money
-Forgery( Fake), Fraud, Robbery with/without violence,
Credibility , Confidence
ーPrivacy ( Anonymity, Private information leakage)
47
Environment
Security Objects
(Community-Culture
including regulatory
issues )
•Contents
•Applications
•Communications
•Operations
Security Mechanisms
•
•
•
•
Security Technologies
Security Modules
Security Systems
Security Infrastructure
ICT Security Management Framework
48
Security Objects
• Contents
Completeness( Integrity ), Secrecy, Certification, Copyright
• Application
Virus, Worm, Destruction, Falsify, Fishing,
• Communications
Access/admission, Routing, AAA (Authentication, Authorization ,
and Accounting), Tapping, Pretence, Espionage, IP spoof
Attack ( Intrusion ,Denial of service, Service degradation, jamming,
etc.)
• Operations
Privacy, Leakage, Risk
49
Security Domains
• Management Layers/processes
OSI 7 Layers services, TMN Logical layer, FAB ( Fulfillment,
assurance and billing ),
• Service Providers and partners
Contracted SP, Virtual SP, ASP, CSP, Management SP, Network
Operator, VMNO, Service/operation agent,
• Users
Enterprise customers Consumers End users Customer
representatives Shareholders
• Physical/Logical Facilities
Terminals, CPE/CPN, Transmission , Service node, Storage,
Data center, Call center, Address/phone number, Routing table,
Domain name server
50
Security Mechanisms/Technologies
• Security Technologies
Encryption, Cryptograph, Authentication, Firewall,
IPsec(Security Architecture for IP),
• Security Modules
SOCKS, Digital signature, Secure protocol ( e.g.IKE: Internet
Key Exchange protocol) Bio metrics, Intrusion detection/block,
Anti virus, IC card, Electronic cash
•
Security Systems and Infrastructure
PKI (Public Key Infrastructure), PKI authority, KES (Key
Escrowed System) , Certification authority, SET: Secure
Electronic Transaction, Standardization
Regulation, Legal and administration protection, Penalty
51