Internet-Draft | Information Distribution | December 2024 |
Jiang, et al. | Expires 14 June 2025 | [Page] |
This document specifies experimental extensions to the GRASP protocol to enable information distribution capabilities. The extension has two aspects: 1) new GRASP messages and options; 2) processing behaviors on the nodes. With these extensions, the GRASP would have following new capabilities which make it a sufficient tool for general information distribution: 1) Pub-Sub model of information processing; 2) one node can actively sending data to another, without GRASP negotiation procedures; 3) selective flooding mechanism to allow the ASAs control the flooding scope.¶
This document updates RFC8990, the GeneRic Autonomic Signaling Protocol (GRASP)[RFC8990].¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 14 June 2025.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The GeneRic Autonomic Signaling Protocol (GRASP)[RFC8990] is a signalling framework and protocol for software components in controlled networks. These software components can use hop-by-hop GRASP flooding and discovery mechanisms to announce and discover services and other information amonst themselves, and GRASP unicast for end-to-end, peer-to-peer communications.¶
Note: GRASP defines only the messaging layer, but not transport and security. It requires a "security and transport substrate" to supplement that functionality. By specifying different substrates, GRASP deployment can be adopted to the specific requirements of the controlled network and applications. For GRASP announcements and discovery, the substrate primarily needs to provide a hop-by-hop encrypted, authenticated and and reliable flooding of GRASP messages, and for GRASP peer to peer communications it requires end-to-end connectivity between GRASP nodes, such as IP or IPv6 and encrypted, authenticated and reliable transport connections, such as TLS.¶
In Autonomic Networks [RFC7575], the software components are called Autonomic Service Agents (ASAs) [RFC8993], and the nodes of the controlled network are called autonomic nodes. The Autonomic Networking Infrastructure (ANI, [RFC8994], [RFC8995]) provides the substrate for GRASP through Local Device IDentity (LDevID) certificates, which are zero-touch provisioned via with Bootstrapping Remote Secure Key protocol (BRSKI) [RFC8995]. The ACP automatically establishes a hop-by-hop secured connectivity for both hop-by-hop forwarding of GRASP discovery and flood messages as well as end-to-end peer-to-peer GRASP messages.¶
Discovery and distribution of information via GRASP as specified in [RFC8990] is intended for instantaneous consumption: sender and receiver need to active simultaneously, with only a limited degree of caching by GRASP possible, but not guaranteed.¶
This document defines a series of GRASP extensions in order to support an asynchronous mode of distributing information called publishing. These extensions are defined through new GRASP messages to support asynchronous distribution and mechanisms for their corresponding processing behaviors in GRASP.¶
In publishing for retrieval mode, information needs to be stored on GRASP nodes and must be re-distributed on-demand. Additionally, conflict resolution is also needed when stored information is updated with information from multiple sources.¶
This document also outlines example classes of use cases to describe different information distribution patterns supported by this document. This is done through analysis of example existing or planned mechanisms. While the explicitly analyzed use cases might have already decided upon non-GRASP based mechanisms, future instances of the same class would in the opinion to the authors fare better with the GRASP based approach in various criteria: simpler, more flexible or more scalable.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This section summarizes the general modes of information distribution. Then Section 3.2 describes gaps of the GRASP protocol to support these modes of information distribution.¶
In a network (either in an Autonomic Network or any other networks), the way of distributing information could be modeled from the following two dimensions.¶
One dimension is from the perspective of the information distribution participants, there are two categories as below:¶
The other dimension is from the timing perspective, also categorized as two modes as below:¶
Note that in both cases, the total size of transferred information can be larger than the payload size of a single message of a used transport protocol (e.g., Synchronization and Flood messages in GRASP). This document also gives support for bulk data transfer in Section 5.3.¶
As most of instantaneous information distribution modes and their requirements have been met by GRASP already, asynchronous information distribution modes need new functions to be supported. In publishing for retrieval mode, information needs to be stored and re-distributed on-demand; additionally, conflict resolution is also needed when stored information is updated with information from multiple sources.¶
To extend GRASP to support the requirements, the necessary extensions are defined in Section 4.¶
In [RFC8990], GRASP message headers and options are transmitted in Concise Binary Object Representation (CBOR) [RFC8949]. They are described using Concise Data Definition Language (CDDL) [RFC8610]. In this specification, an Un-solicited Synchronization message follows the pattern, in CDDL:¶
A node SHOULD actively send a unicast Un-solicited Synchronization message with the Synchronization data, to another node. This SHOULD be sent to port GRASP_LISTEN_PORT at the destination address, which could be obtained by GRASP Discovery or other possible ways. The synchronization data are in the form of GRASP Option(s) for specific synchronization objective(s).¶
In CDDL, a Selective-Flooding option follows the pattern:¶
Selective-Flooding-option = [O_SELECTIVE_FLOOD, +O_MATCH-CONDITION, match-object, action]¶
The option field encapsulates a match-condition option which represents the conditions regarding to continue or discontinue flooding of the current message. For the match-condition option, the Obj1 and Obj2 are two objects that need to be compared. For example, the Obj1 could be the role of the device and Obj2 could be "PE Router". The match rules between the two objects could be greater, less than, within, or contain. The match-object represents of which Obj1 belongs to, it could be the device itself or the neighbor(s) intended to be flooded. The action means, when the match rule applies, the current device just continues flood or discontinues.¶
In CDDL, a Subscription Objective Option follows the pattern:¶
This option MAY be included in GRASP M_Synchronization, when included, it means this message is for a subscription to a specific object.¶
In fragmentary CDDL, a Unsubscription Objective Option follows the pattern:¶
This option MAY be included in GRASP M_Synchronization, when included, it means this message is for a un-subscription to a specific object.¶
In fragmentary CDDL, a Publishing Objective Option follows the pattern:¶
This option MAY be included in GRASP M_Synchronization, when included, it means this message is for active delivery of a specific object data.¶
This section defines how a GRASP node should behave in order to support the two identified modes of information distribution is discussed.¶
In this case, an information sender directly specifies the information receiver(s). The instant information distribution sub-module will be the main element.¶
IID sub-module performs instant information transmission for ASAs The IID sub-module has to retrieve the address of the information receiver specified by an ASA, then deliver the information to the receiver. Such a delivery can be done either in a connectionless or a connection-oriented way.¶
Current GRASP provides the capability to support instant P2P synchronization for ASAs. A P2P synchronization is a use case of P2P information transmission. However, as mentioned in Section 3, there are some scenarios where one node needs to transmit some information to another node(s). This is different to synchronization because after transmitting the information, the local status of the information does not have to be the same as the information sent to the receiver. An extension to support instant P2P communication on GRASP is described in Section 4. A node could send a M_UNSOLIDSYNCH message to the GRASP_LISTEN_PORT of the corresponding node.¶
IID sub-module finishes instant flooding for ASAs. Instant flooding is for all ASAs. An information sender has to specify a special destination address of the information and send to all GRASP neighbors. When those GRASP neighbors IID sub- module receives such a message, after checking its TTL, it forwards the message to its respective GRASP neighbors. In order to avoid looping, the existing GRASP session ID and TTL are used.¶
In order to avoid unnecessary flooding, a selective flooding can be done where an information sender wants to send information to multiple receivers at once. An exemplary extension to support selective flooding on GRASP is described in Section 4.¶
When doing this, sending information needs to contain criteria to judge on which interfaces the distributed information should and should not be sent. Specifically, the criteria contain:¶
O_MATCH- CONDITION in Selective-Flooding-option: matching condition, a set of matching rules such as addresses of recipients, node features and so on.¶
action in Selective-Flooding-option: what the node needs to do when the Matching Condition is fulfilled. For example, the action could be forwarding or dropping the distributed message.¶
Sent information must be included in the message with Selective-Flooding-option distributed from the sender. The receiving node reacts by first checking the carried O_MATCH- CONDITION in the message to decide who should consume the message, which could be either the node itself, some neighbors or both. If the node itself is a recipient, action in Selective-Flooding-option is followed; if a neighbor is a recipient, the message is sent accordingly.¶
In asynchronous information distribution, sender(s) and receiver(s) are not immediately specified while they may appear in an asynchronous way. First, the AID sub-module enables that the information can be stored in the network; second, the AID sub-module provides an information publication and subscription (Pub/Sub) mechanism for ASAs.¶
As sketched in the previous section, each GRASP node requires two modules: 1) Information Storage (IS) module and 2) Event Queue (EQ) module in the information distribution module. Details of the two modules are described in the following sections.¶
The Information Storage (IS) module handles how to save and retrieve information for ASAs across the network. It makes the index of information (e.g. by Distributed Hash Table) and maps the index to a certain GRASP node. Storing information should be realized through the following steps.¶
Similarly, getting stored information should be realized in the following steps.¶
IS module can reuse distributed databases and key value stores like NoSQL, Cassandra, DHT technologies. Storage and retrieval of information are all event-driven responsible by the EQ module.¶
The Event Queue (EQ) module is to help ASAs to publish information to the network and subscribe/unsubscribe to interested information in asynchronous scenarios. Extensions to support information publishing, subscription and unsubscription on GRASP are described in Section 4. Information generated on GRASP nodes is an event labeled with an event ID, which is semantically related to the topic of the information. Key features of EQ module are summarized as follows.¶
The EQ module on every network node operates as follows.¶
The category of event priority is defined as the following. In general, there are two event types:¶
Event contains the address where the information is stored, after a subscriber is notified, it directly retrieves the information from the given location.¶
Both cases discussed previously are limited to distributing messages containing GRASP Objective Options that cannot exceed the GRASP maximum message size of 2048 bytes. This places a limit on the size of data that can be transferred directly in a GRASP message such as a Synchronization or Flood operation for instantaneous information distribution.¶
There are scenarios where this restriction is a problem. One case is the distribution of network policy in lengthy YANG formats such as XML or JSON. Another case might be ASA uploading a log file to the Network Operations Center (NOC). A third case might be a supervisory system downloading a software upgrade to a network node. A related case might be installing the code of a new or updated ASA to a network node.¶
Naturally, an existing solution such as a secure file transfer protocol or secure HTTP might be used for this. Other management protocols such as syslog [RFC5424] or NETCONF [RFC6241] might also be used for related purposes, or might be mapped directly over GRASP. The present document, however, applies to any scenario where it is preferable to re-use the existing end-to-end connectivity and GRASP infrastructure to transfer a significant amount of data, rather than install and configure an additional mechanism.¶
The node behavior is to use the GRASP Negotiation process to transfer and acknowledge multiple blocks of data in successive negotiation steps, thereby overcoming the GRASP message size limitation. The emphasis is placed on simplicity rather than efficiency, high throughput, or advanced functionality. For example, if a transfer gets out of step or data packets are lost, the strategy is to abort the transfer and try again. In an enterprise network with low bit error rates, and with GRASP running over TCP or TLS, this is not considered a serious issue.¶
As for any GRASP operation, the two participants are considered to be ASA, and they communicate using a specific GRASP Objective Option, containing their own name, some flag bits, a loop count, and a value. In bulk transfer, we can model the ASA acting as the source of the transfer as a download server, and the destination as a download client. No changes or extensions are required to GRASP itself, but compared to a normal GRASP negotiation, the communication pattern is slightly asymmetric:¶
The last two steps SHOULD be repeated until the transfer is complete. The server SHOULD signal the end by transferring an empty byte string as the final value. In this case the client responds with a normal end to the negotiation (M_END message with an O_ACCEPT option).¶
Errors of any kind SHOULD be handled with the normal GRASP mechanisms, in particular by an M_END message with an O_DECLINE option in either direction. In this case the GRASP session terminates. It is then the client's choice whether to retry the operation from the start, as a new GRASP session, or to abandon the transfer. The block size must be chosen such that each step does not exceed the GRASP message size limit of 2048 bits.¶
The distribution source authentication could be done at multiple layers:¶
Outer layer authentication: the GRASP communication is within the GRASP security and transport substrate, such as peer-to-peer TLS connections for unicast and hop-by-hop TLS for flooding of GRASP messages. This is the default GRASP behavior.¶
Inner layer authentication: the GRASP communication might not use a sufficient security and transport substrate, then there should be embedded protection in distribution information itself through authenticated GRASP messages.¶
This document defines a new GRASP message named "M_UNSOLIDSYNCH" and a new option named "O_SELECTIVE_FLOOD" which need to be added to the "GRASP Messages and Options" registry defined by [RFC8990]. This document also defines three new GRASP Objectives, "Subscription", "Unsubscription" and "Publishing" which need to be added to the "GRASP Objective Names" table.¶
Valuable comments were received from Zoran Despotovic, Michael Richardson, Roland Bless, Mohamed Boucadair, Diego Lopez and other participants in the ANIMA working group.¶
This document was produced using the xml2rfc tool [RFC7991].¶
Brian Carpenter School of Computer Science University of Auckland PB 92019 Auckland 1142 New Zealand Email: brian.e.carpenter@gmail.com Toerless Eckert Futurewei Technologies USA Santa Clara, 95014 United States of America Email: tte@cs.fau.de¶
Actions triggered to the information distribution module will eventually invoke an underlying GRASP APIs. Moreover, Event Queue and Instance Storage modules are usually correlated. When an ASA publishes information, not only such an event is translated and sent to EQ module, but also the information is indexed and stored simultaneously. Similarly, when an ASA subscribes information, not only subscribing event is triggered and sent to EQ module, but also the information will be retrieved by IS module at the same time.¶
Storing and publishing information: This action involves both IS and EQ modules where a node that can store the information will be discovered first and related event will e published to the network. For this, GRASP APIs discover(), synchronize() and flood() are combined to compose such a procedure. In specific, discover() call will specify its objective to be "store_data" and the return parameters could be either an ASA_locator that will accept to store the data, or an error code indicating that no one could afford such data; after that, synchronize() call will send the data to the specified ASA_locator and the data will be stored at that node, with return of processing results like store_data_ack; meanwhile, such a successful event (i.e. data is stored successfully) will be flooded via a flood() call to interesting parties (such a multicast group existed).¶
Subscribing and getting information: This action involves both IS and EQ modules as well where a node that is interested in a topic will subscribe the topic by triggering EQ module and if the topic is ready IS module will retrieve the content of the topic (i.e. the data). GRASP APIs such as register_objective(), flood(), synchronize() are combined to compose the procedure. In specific, any subscription action received by EQ module will be translated to register_objective() call where the interested topic will be the parameter inside of the call; the registration will be (selectively) flooded to the network by an API call of flood() with the option we extended in this draft; once a matched topic is found (because of the previous procedure), the node finding such a match will call API synchronize() to send the stored data to the subscriber.¶
This section describes example classes of use cases where information distribution is required.¶
In-network computing (INC) has gained more and more attentions in recent years [The-case-for-in-network-computing-on-demand]. INC improves the utilization of the computing resources in the network; INC also brings the processed results closer to the users, which may potentially improves the QoS of network services.¶
Unlike existing network systems, INC deploys computing tasks directly in the network rather than pushing the tasks to endpoints outside the network. Therefore, a network device is not just a transport device, but a mixture of forwarding, routing and computing.¶
Proliferation of INC use cases will also make storage capability support in network devices supporting INC more ubiquitous. Furthermore, INC agents deployed on network nodes will have to communicate with each other by exchanging information. There are several typical applications, where information distribution capability is required, which are summarized below.¶
ASAs running on network nodes are the abstraction of the distributed agents for the INC use case and can enable all scenarios described above through information distribution via GRASP.¶
V2X communication is an inevitable enabling technology that connects vehicles to networks, where value-added services can be provided and enhance the functionalities of a vehicle. In this section, we introduce some use cases that will be closely relevant to information distribution via GRASP.¶
Note that there could be different models to support the potential use cases above. The first mode is that vehicles are not part of the GRASP deployment but simply access the edge nodes that are part of the GRASP deployment through other protocols, and those edge nodes form the GRASP deployment, which is using GRASP information distribution to provide information required by the vehicles.¶
An alternative model is more radical, where the vehicles also belong to the GRASP deployment, for example forwarding GRASP messages amongst themselves when forming am edge- mesh network. This model may further require that all entities, both at the network side and the end point side, must be able to establish a mutual trust, such as outlined in the introduction via LDevIDs or other type of mutually trusted credentials.¶
Smart homes are designed to make home life much easier. Smart homes refer to a convenient home setup in which appliances and devices can be remotely controlled from anywhere using a mobile or other network device over an Internet connection. Today, devices in the smart home are most often orchestrated over the Internet, allowing users to remotely control functions such as home security access, temperature, lighting, and a home theater. In this section, we present some use cases for which GRASP with information distribution could provide a better communications infrastructure.¶