Version: 0.7.8 Date: March 14, 2025
Copyright © 2025 Switchnomix, Inc.. All rights reserved.
API Specification: h3netschema.json; API
GitHub: H3Net Protocol
Note: This specification is still under development. Schema is updated first and then the specification. Architecture and Operations sections may be behind in terms of update
Introduction
Design Requirements and Goals
Architecture
Protocol Operations
Message Formats and Definitions
Match-Action Table Structure
Pipeline Processing
Security Considerations
Error Handling and Resilience
Implementation Guidelines
Test Suite
Use Cases and Scenarios
Versioning and Compatibility
References
Glossary
Appendices
The H3Net Protocol is designed to revolutionize network control and security management by enabling enterprises to deploy, manage, and scale their infrastructure effortlessly, without the need for manual coding or extensive staff training. As network and security automation becomes increasingly complex, organizations struggle with fragmented solutions that rely heavily on “glue code” — a costly and maintenance-intensive combination of open-source, commercial, and custom tools. This challenge has persisted for decades, with enterprises repeatedly addressing similar issues using disparate tools and protocols, further exacerbating network and security complexity.
H3Net is dedicated not only to the efficient, secure, and predictive management of today’s networks but also to laying the foundation for the networks of the future. More than just a protocol, H3Net embodies a transformative vision for networking and security, where AI and automation play an increasingly prominent role.
While existing protocols like OpenFlow and P4 have introduced dynamic pipeline capabilities for network infrastructure components such as firewalls, routers, switches, and wireless access points, they are limited in scope and deployment. This creates a need for a unified protocol that can comprehensively manage these diverse dataplanes. H3Net addresses this gap with a standards-based approach built on HTTP/3 and JSON, providing enterprises with seamless, distributed control across a wide range of network devices.
The H3Net Protocol eliminates the dependency on vendor-specific glue code and manual network service provisioning. By offering a vendor-neutral solution, H3Net facilitates centralized management of diverse network devices through a single control plane and unified management console. Devices that natively implement the H3Net Protocol integrate seamlessly into this unified management framework, enabling customers to deploy and manage various network devices without the complexity of vendor-specific configurations. This empowers organizations to leverage the latest advancements in network and security technologies with ease.
How is specification structured?
In today’s complex network environments, enterprises are burdened by vendor lock-in and the extensive effort needed to maintain device-specific glue code for each vendor’s unique API and management protocol. Traditional methods for network and security device management require significant manual intervention, with inconsistent support for modern software-defined and data-driven approaches. Additionally, as enterprises expand their network footprints and adopt multi-vendor infrastructures, the operational costs and complexity multiply, making network and security management a costly, error-prone process.
The H3Net Protocol is designed to address these challenges by providing a unified, vendor-neutral protocol built on modern, web-native standards (HTTP/3 and JSON). H3Net’s approach allows diverse network devices to be managed dynamically and centrally, using a single control plane. By eliminating the need for vendor-specific glue code, H3Net lowers operational costs and reduces complexity, enabling enterprises to achieve rapid deployment, seamless updates, and scalable network management.
H3Net leverages REST principles not as a traditional API but as an integration model through a shared schema. This approach emphasizes stateful resource interactions over rigid API methods, allowing for a more flexible and dynamic management of network resources. By focusing on a shared integration schema, H3Net enables efficient collaboration between the control plane and network devices, facilitating real-time updates and state synchronization.
REST is best understood as a data-oriented approach where the integration happens through a shared schema (resource model) rather than an explicitly defined API with rigid procedures. A RESTful service exposes a schema (i.e., a representation of resources and their states) rather than defining explicit function calls like an RPC-based API would.
GET
, POST
, PATCH
,
DELETE
).Thus, REST is not about defining function calls (as in an API); rather, it’s about defining stateful resource interactions over HTTP.
HTTP/3 over QUIC, a lightweight and efficient transport layer protocol, provides several advantages that align well with H3Net’s objectives, especially compared to gRPC’s reliance on HTTPS for secure connectivity.
A key benefit of JSON over HTTP/3 is its streamlined connection model. Unlike gRPC, which typically runs over HTTPS to ensure security, HTTP/3 integrates QUIC directly as its transport layer and inherently supports TLS 1.3, eliminating the need for a separate HTTPS layer. This integration simplifies secure connections and may reduce resource consumption, offering a more efficient and effective solution for real-time operations.
While HTTP/3 supports multiplexed streams, it does not natively include gRPC’s persistent, bidirectional streaming model—often used in chat applications that require continuous bidirectional flows. HTTP/3’s unidirectional QUIC streams, while simpler, effectively manage independent data flows with reduced latency.
Though gRPC’s Protocol Buffers are more compact than JSON, HTTP/3 mitigates head-of-line blocking by managing streams independently, helping minimize latency. This makes JSON over HTTP/3 lightweight and practical for dynamic network management, particularly in high-traffic environments. Additionally, HTTP/3’s broad compatibility with the web ecosystem, including native support across browsers and web servers, eases cross-platform deployment and maintenance.
Another major advantage of HTTP/3 over QUIC is its extensive standardization and universal support across platforms and frameworks, unlike gRPC. HTTP/3 is highly compatible with web-based applications, providing reliable connections even in mobile or unstable networks. With QUIC’s built-in features like connection migration and faster recovery from network interruptions, HTTP/3 offers greater resilience than gRPC, which lacks native support for seamless recovery in dynamic network conditions.
Although gRPC includes features like service discovery and client-side load balancing for complex microservices, HTTP/3’s web-first design is often better suited to standard deployment architectures, where HTTP serves as the primary protocol. Its well-established ecosystem and compatibility with most modern browsers and servers make HTTP/3 an ideal choice for H3Net’s cross-platform and multi-vendor support goals.
In environments where scalability, interoperability, and ease of deployment are essential, HTTP/3 over QUIC with JSON provides a secure, lightweight, and reliable solution for H3Net’s real-time, vendor-neutral network management requirements.
For better real-time performance, implementations can utilize WebSockets after establishing the initial HTTP/3 connection. This approach enables higher performance and lower latency, particularly for real-time updates such as telemetry and events.
WebTransport is a new protocol that runs over HTTP/3 QUIC, designed for low-latency, bi-directional messaging. It combines the best of:
Key Features:
Feature | WebSockets | WebTransport |
---|---|---|
Underlying Protocol | TCP | HTTP/3 (QUIC) |
Multiplexing | ❌ No (one stream per connection) | ✅ Yes (many streams in one connection) |
Reliability | ✅ TCP ensures delivery | ✅/❌ Can be reliable (like TCP) or unreliable (like UDP) |
Server Push | ❌ No native push | ✅ Server can push messages anytime |
Latency | ⚠️ Higher (TCP-based) | ✅ Lower (QUIC-based) |
WebTransport is used for real-time updates such as telemetry, events, notifications and controller to device communication.
OpenAPI is a service contract definition that specifies how clients can interact with a RESTful (or HTTP-based) service. However, it often inherits an RPC mindset—where the focus is on describing endpoints, operations, and request/response structures, rather than emphasizing the shared schema.
In H3Net, the control plane and network devices share an integration schema rather than just an API:
Instead of treating device management as a set of RPC calls (as OpenFlow, gNMI, or SNMP do), H3Net follows a more state-driven model:
This perspective challenges the common “API-first” mindset in network management and instead promotes state-first integration—which aligns more closely with how real-world distributed systems function.
AI/ML models require clean, consistent, and structured data to produce accurate results. Traditional network environments use disparate tools and protocols, leading to fragmented and inconsistent data. Traditional methods often rely on batch processing of logs, which delays anomaly detection and incident response. Manual network optimization is time-consuming and error-prone, especially in dynamic environments. Network security tools often struggle with siloed data and delayed responses to evolving threats. Deploying AI/ML solutions often requires complex integrations with various vendor-specific systems. Many AI/ML models rely on enriched datasets combining multiple data sources, which is often cumbersome in traditional systems. Current network management systems lack the real-time adaptability required for autonomous operation. Traditional methods rely on reactive maintenance, leading to downtime and resource wastage. Managing AI/ML models alongside disparate network management tools increases operational costs and complexity. Enterprises often face barriers to adopting new AI/ML-driven solutions due to legacy systems and vendor lock-in.
The H3Net Protocol’s real-time network and security data capabilities align well with the Model Context Protocol (MCP), which facilitates seamless integration between data sources and AI models such as Claude. By combining H3Net’s efficient data propagation via HTTP/3 + WebTransport with MCP’s structured context management, organizations can build intelligent automation pipelines that leverage real-time network telemetry, security events, and configuration data for AI-driven insights. This integration can enhance use cases such as anomaly detection, predictive maintenance, automated threat response, and dynamic network optimization. H3Net’s ability to deliver enriched, contextual data in real time makes it an ideal data source for MCP-enabled AI models, driving informed decision-making and improved operational efficiency.
RDMA enables direct memory access from one computer to another without involving the CPU, OS kernel, or interrupts, offering low-latency, high-throughput communication. RDMA NICs, like Mellanox ConnectX or Broadcom adapters, operate using RDMA-capable protocols such as RoCE (RDMA over Converged Ethernet) or iWARP. The Falcon Protocol from Google Cloud is designed to provide a reliable, low-latency hardware transport layer for GPU cluster networks.
H3Net can be extended to support RDMA/RoCEv2/Falcon protocol based networks that are used to build AI training/inference clusters. This is a new use case for H3Net for possible inclusion in future versions of the protocol. One approach is to extend H3Net to include RDMA-specific APIs in the controller to manage devices at the RDMA layer, abstracting these details from higher-level applications. We could also optimize JSON serialization/deserialization or provide an alternative lightweight binary encoding for certain telemetry-intensive RDMA use cases.
+------------------------------------------------------------+
| H3Net Controller ( Core, Config, Telemetry, Operations )|
| |
| - Configuration Management - Policy Enforcement |
| - Telemetry Aggregation - Flow Rule Updates |
+------------------------------------------------------------+
^ ^ ^ ^
| | | |
Enrichment Out-of-band | H3Net JSON | RDMA Verbs
Admin # over HTTP/3 | API
| |
v v
+------------------------------------------------------------+
| H3Net Client Dataplane (Device or Software) |
|(switch, router, wireless AP, firewall, load balancer, PDU )|
| |
| - Match-Action Tables - QoS Rules |
| - Flow Offloading - Telemetry Collection |
| - Device configuration - Congestion Control |
| - RDMA Traffic Management for RDMA-capable NICs |
+------------------------------------------------------------+
^
|
Out-of-band Admin
Currently, all cloud providers have customized solutions for network and security management of their AI training/inference clusters. This feature is currently out of scope for this version of H3Net.
The H3Net Protocol offers a unified, scalable solution for managing network Dataplanes across different types of devices, including switches, routers, firewalls, and wireless access points, while removing the need for device-specific glue code. It aims to provide an elastic, secure, and regulatory-compliant control and management plane, enhancing operational agility and reducing costs associated with digital transformation initiatives.
H3Net leverages best practices from existing network management technologies – including OpenFlow for software-defined networking, P4 for programmable Dataplanes, OpenConfig protocols (gNMI, gNOI) for network management and operations, eBPF for packet filtering, and nftables for packet classification and filtering. This protocol specification covers the architecture, message formats, operational guidelines, and security considerations necessary for a comprehensive implementation of the H3Net Protocol.
This document is intended for:
This specification provides detailed guidance for both control plane and Dataplane implementation, along with integration guidelines for vendors looking to make their devices H3Net-compatible. It also includes a comparison with related protocols to help readers understand the context and intended purpose of H3Net.
The H3Net Protocol is designed to address several key challenges in network and security management. This section outlines the essential goals and requirements that guide the protocol’s development.
SNMP
,
SSH
, gNMI
, OpenFlow
, etc.) to
enhance security and minimize exposure.Linux serves as the core operating system for most networking and security devices, spanning both commercial and open-source solutions. Vendors typically customize Linux by adding proprietary layers to secure the device and expose specific services. However, this variability introduces challenges that H3Net aims to address by standardizing processes, enhancing interoperability, and reducing the customer burden.
root
users without granular
access controls or programmatic authorization. This poses significant
security risks and challenges in maintaining strict access
management.root
or sudo
credentials for authorized access. This increases the attack surface,
making it critical to develop a secure, standardized service
registration mechanism.Distributed Control Plane: While some vendors have embraced the separation of control and dataplane, few have adopted a distributed control plane with multi-controller, role-based architectures due to the significant challenges it presents. One major issue is controller state synchronization and consistency—achieving consensus among distributed controllers is particularly difficult during network partitions or controller failures.
Coordination between controllers can also introduce additional latency, adversely affecting real-time decision-making and network performance. Handling controller failures seamlessly and ensuring quick failover to secondary controllers without disrupting operations is complex, especially when the secondary controller lacks an up-to-date state.
Role-based architectures add another layer of complexity, requiring clear definition and enforcement of role boundaries to prevent conflicts and unauthorized access, particularly in multi-tenant environments.
As the system scales with more controllers and network devices, maintaining performance without degradation becomes challenging. Additionally, a distributed control plane expands the attack surface, increasing susceptibility to DDoS attacks and other security threats.
In the case of network partitioning, ensuring controllers can operate independently and later reconcile their states without causing disruptions is a particularly intricate task.
Unified Management Protocol: The proliferation of protocols such as gNMI, gNOI, and P4Runtime has introduced significant complexity without offering a standardized solution for managing all network devices, underscoring the critical need for a unified management approach.
Programmable Dataplane: OpenFlow’s capabilities are largely confined to network switches, while P4’s complexity has hindered widespread adoption. Vendors have been slow to fully embrace dynamically programmable dataplane pipelines, limiting the potential for flexible, real-time network customization.
AI/ML is transforming network and security management, enabling new capabilities such as anomaly detection, real-time threat analysis, and automated policy enforcement. There is a need for a standardized, seamless integration of AI/ML models into the control plane, enabling real-time, data-driven decision-making and automation.
By addressing these diverse challenges, H3Net aims to establish a standardized framework that simplifies device management, enhances security, and promotes interoperability. This comprehensive approach reduces complexity, strengthens security measures, mitigates vendor lock-in, and fosters a more adaptable, vendor-neutral ecosystem. H3Net is designed to support the next generation of networks and cybersecurity, incorporating higher speeds, AI/ML, ensuring a secure, efficient, and resilient future in network management and operations.
The H3Net Protocol’s architecture provides a cohesive framework for managing diverse network and security devices. This design addresses critical requirements such as vendor independence, real-time asset visibility, security, and scalability. It incorporates both control and Dataplanes, with distinct roles and interactions defined between controllers, Dataplanes, and asset management.
The H3Net Protocol follows a layered design to support flexible interactions across different network devices. The architecture is built on three main components:
Control Plane: Manages device configuration, policies, and protocol logic. It also initiates communication with the Dataplane through standardized HTTP/3 with JSON encoding to ensure compatibility and minimize the need for device-specific adaptations. Role based access control is enforced to manage access to the Dataplane. Control Planes roles include Configuration Management, Telemetry and Events Collection, Dataplane Dynamic Pipeline management, and Asset Management.
The Control Plane or Controller in short, will use idempotency to achieve high levels of automation, reliability, and efficiency, crucial for operating large-scale, complex networks.
Idempotency in networking means that applying the same network configuration or command multiple times yields the same result as applying it once. This ensures stability and consistency in network management.
Why Idempotency?
Centralized Control - enables network configurations centrally, making it easier to enforce idempotent behavior across their vast network infrastructure.
Real-Time State Monitoring - The controller continuously monitors the state of the network, ensuring that all configurations align with the desired state.
Declarative Approach - Instead of issuing procedural commands, configurations are declared as desired states. The controller ensures the network matches these states, automatically reconciling any discrepancies.
The methodology and functionality reduces manual intervention and simplifies network operations and scale network more effectively. Minimizes downtime and errors, as repeated commands or state reconciliations do not disrupt the network thus enahancing realiability. Large-scale changes can be rolled out reliably thus scaling network operations more effectively.
Dataplane: Includes network devices (e.g., switches, routers, firewalls, wireless access points) and supports programmable packet processing pipelines, facilitating dynamic updates via H3Net’s API calls. Role based access control is enforced to manage access to the Control Plane.
Asset Management Interface: Utilizes AssetDB to provide a standardized, real-time database for asset tracking, including device lifecycle and usage statistics. This data is essential for visibility and maintaining the asset’s health and location data across distributed deployments.
HTTP Method Standardization:
This diagram shows the major components of the H3Net Protocol: the Control Plane, Dataplane, and Asset Management Interface.
+---------------------------+
| Control Plane |
|---------------------------|
| - Configuration Manager |
| - RBAC and Security |
| - Telemetry Collection |
| - Conflict Resolution |
+---------------------------+
|
|
|
+---------------------------+
| Dataplane |
|---------------------------|
| Device Types: |
| - Switches |
| - Routers |
| - Firewalls |
| - Wireless APs |
| - L2 Switch |
| - UTM |
| - VoIP (Phone) |
| - Load Balancer |
| - VPN Gateway |
| - Power Dist Unit |
|---------------------------|
| - Packet Processing |
| - Telemetry/Monitoring |
| - Event Notifications |
+---------------------------+
|
|
|
+---------------------------+
| Asset Management |
| (AssetDB Integration) |
|---------------------------|
| - Real-time asset tracking|
| - Device status updates |
| - Lifecycle management |
+---------------------------+
The components interact through the following core protocols and processes:
HelloMessage
to establish communication, while
CapabilityRequestMessage
and
CapabilityResponseMessage
allow the Control Plane to assess
device capabilities.DeviceConfigUpdateMessage
and
PipelineUpdateMessage
. These messages update configuration
and manage device-specific match-action tables.TelemetryMessage
and
InterfaceStatsMessage
, supporting real-time health
monitoring and metrics gathering.StateQueryMessage
enables real-time
tracking of asset locations and operational status.The H3Net Protocol defines several states for communication between the Control Plane and Dataplane:
HelloMessage
from the Dataplane to the Control
Plane.State transitions are managed through explicit status and response
messages, such as ResponseMessage
and
ErrorMessage
, to maintain reliability across the
protocol.
This state machine diagram shows the transitions and interactions between states during the lifecycle of the H3Net Protocol communication.
[Start]
|
|
v
+----------------------+
| Initialization |
|----------------------|
| - Send HelloMessage |
+----------------------+
|
|
v
+-----------------------+
| Capability Discovery |
|-----------------------|
| - Send CapabilityReq |
| - Receive Capabilities|
+-----------------------+
|
|
v
+----------------------+
| Active Configuration |
|----------------------|
| - Update Configs |
| - Monitor Telemetry |
+----------------------+
|
|
v
+----------------------+
| Asset Sync |
|----------------------|
| - Asset Status Update|
| - Sync with AssetDB |
+----------------------+
|
|
v
+----------------------+
| Error Handling |
|----------------------|
| - Error Notifications|
+----------------------+
|
|
v
[End]
The Control Plane serves as the centralized intelligence for managing and configuring network devices. Key roles and functions include:
GetConfigMessage
,
DeviceConfigUpdateMessage
).coreAuth
, configAuth
, etc.) that align with
assigned roles.The Dataplane represents the network devices that H3Net manages. Key responsibilities include:
TelemetryMessage
,
EventNotificationMessage
) and alerts to the Control Plane,
providing real-time insights into device health and network
performance.A dataplane pipeline in networking refers to the series of processing stages that network packets go through as they traverse a network device like a switch or router. Each stage applies specific actions or transformations to the packets based on predefined rules, ensuring efficient and effective packet forwarding, filtering, or modification. The dataplane pipeline is structured into multiple processing stages, each represented as a flow table. These tables define how packets are handled as they traverse the network device.
Flow Tables and Processing Stages:
Flow Tables: Each flow table comprises multiple flow entries, with each entry containing match fields, priority, counters, instructions, and actions. The match fields specify criteria (e.g., specific header values) that incoming packets are compared against. When a packet matches a flow entry, the associated instructions and actions determine its subsequent processing.
Pipeline Processing: Packets enter the first flow table (Table 0) and are evaluated against its flow entries. If a match is found, the specified instructions are executed, which may include modifying the packet, updating its action set, or directing it to another flow table for further processing. This progression continues until the packet reaches the end of the pipeline, where the accumulated action set is executed, typically resulting in forwarding, dropping, or further modification of the packet.
Processing Mechanics:
Match-Action Paradigm: The core of the pipeline operates on a match-action basis. Packets are matched against flow entries, and upon a match, corresponding actions are applied. This design allows for flexible and dynamic packet handling, enabling functionalities like routing, filtering, and load balancing.
Action Set: As packets progress through the pipeline, they accumulate an action set — a collection of actions to be executed at the end of the pipeline. Flow entries can modify this action set using instructions such as Write-Actions or Clear-Actions. The deferred execution of the action set ensures that all necessary modifications are applied cohesively before the packet exits the pipeline.
Table Miss Handling: If a packet does not match any entry in a flow table (a table miss), the dataplane follows a predefined behavior, which may involve dropping the packet, sending it to the controller for further instructions, or directing it to another table. This mechanism ensures that all packets are accounted for, even if they don’t match existing flow entries.
Efficiency and Flexibility:
This table-based pipeline architecture offers several advantages:
Scalability: Multiple flow tables can be employed to handle complex processing tasks, allowing for scalable network management.
Modularity: Each table can be designed to handle specific functions, such as VLAN tagging or QoS enforcement, promoting modularity and ease of management.
Dynamic Updates: Controllers can dynamically modify flow entries in response to network changes, providing real-time adaptability.
By structuring the dataplane pipeline into flow tables and employing a match-action processing model, a controller can enable efficient, flexible, and programmable network traffic management.
The following sequence diagram illustrates the interactions between the Control Plane, Dataplane, and a network device during the H3Net Protocol operation. This includes the initial connection setup, capability exchange, configuration management, telemetry reporting, network discovery, and health status monitoring.
Control Plane Dataplane
+----------------+ +----------------+
| | | |
| Controller | | Network Device|
| | | |
+----------------+ +----------------+
| |
| 1. Hello Message (POST /hello) |
|------------------------------------------------->|
| |
| 2. Hello Response (200 OK) |
|<-------------------------------------------------|
| |
| 3. Capability Request (GET /discovery/capability)|
|------------------------------------------------->|
| |
| 4. Capability Response (200 OK) |
|<-------------------------------------------------|
| |
| 5. Device Config Update (POST /config/device) |
|------------------------------------------------->|
| |
| 6. Config Update Response (200 OK) |
|<-------------------------------------------------|
| |
| 7. Pipeline Update (POST /config/pipeline) |
|------------------------------------------------->|
| |
| 8. Pipeline Update Response (200 OK) |
|<-------------------------------------------------|
| |
| 9. Telemetry Metrics (POST /telemetry/metrics) |
|<-------------------------------------------------|
| |
| 10. Telemetry Acknowledgment (200 OK) |
|------------------------------------------------->|
| |
| 11. Network Discovery (POST /discovery/network) |
|------------------------------------------------->|
| |
| 12. Discovery Response (200 OK) |
|<-------------------------------------------------|
| |
| 13. State Query (POST /operations/state) |
|------------------------------------------------->|
| |
| 14. State Query Response (200 OK) |
|<-------------------------------------------------|
| |
| 15. Health Status Check (GET /health) |
|------------------------------------------------->|
|<-------------------------------------------------|
| |
| 16. Health Status Response (200 OK) |
|<-------------------------------------------------|
| |
The sequence of interactions is summarized in the following high-level flow:
Dataplane
➔ Control Plane
: Sends
HelloMessage
.Control Plane
➔ Dataplane
: Sends
CapabilityRequestMessage
.Dataplane
➔ Control Plane
: Responds with
CapabilityResponseMessage
.Control Plane
➔ Dataplane
: Sends
DeviceConfigUpdateMessage
for configuration.Dataplane
➔ Control Plane
: Responds with
ResponseMessage
or ErrorMessage
.Dataplane
➔ Control Plane
: Sends
TelemetryMessage
with real-time data.Control Plane
➔ AssetDB
: Logs telemetry
data to provide insight and reporting.Control Plane
➔ AssetDB
: Updates asset
lifecycle information (e.g., status, maintenance history).Control Plane
➔ Dataplane
: Sends
PipelineUpdateMessage
to adjust match-action tables
dynamically.This sequence ensures continuous synchronization between the Control and Dataplanes, enabling automated configuration, telemetry monitoring, and asset management updates across the network infrastructure.
The H3Net Protocol is defined using OpenAPI 3.0.0 specification format, with a modular structure that supports extensibility and maintainability. The schema is organized into the following key components:
h3netschema.json
serves as the entry point and contains:
h3netschema.json
under components/schemas
,
this section defines all data models used throughout the API, including:
The H3Net Protocol schema is organized into the following key components:
components/schemas
section of the OpenAPI specification,
these include:
BaseMessage
: Foundation for all messages with common
fieldsBaseRequest
: Extension of BaseMessage for request
operationsBaseResponse
: Extension of BaseMessage for
responsesBaseErrorResponse
: Extension of BaseResponse for error
conditionsDeviceSettings
: Device configuration settingsSwitch
: Switch-specific configurationPortConfig
: Port configuration settingsVLAN
: VLAN configurationACL
: Access Control List configurationRoutingConfig
: Routing configurationPipelineConfig
: Pipeline configurationMatchActionTable
: Match-action table definitionFlowEntry
: Flow entry for match-action tablesTelemetryMessage
: Telemetry metricsInterfaceStatsMessage
: Interface statisticsMeterConfig
: Meter configuration for QoSCapabilityRequestMessage
: Requests device
capabilitiesCapabilityQueryResponse
: Response containing device
capabilitiesNetworkTopology
: Network topology informationRoleUpdateMessage
: Updates role configurationSecurityPolicy
: Security policy configurationEach component is versioned as part of the overall API version and follows OpenAPI 3.0.0 specification format. The modular structure allows for independent evolution of different functional areas while maintaining backward compatibility.
Modular Design: Each schema file is modular, focusing on a specific aspect of the protocol. This modularity allows individual components to be updated or extended without impacting the entire schema.
Schema Versioning: Each schema file can include
a version identifier (schema_version
), ensuring
compatibility and traceability of changes.
Additive Changes: The schema structure favors additive changes, allowing new fields or definitions to be added without disrupting existing functionality. This approach ensures backward compatibility.
Deprecated Elements: Elements marked as deprecated remain functional for a specified period, facilitating smooth transitions to newer schema versions.
Common Definitions: Shared definitions in
core/common_definitions.json
reduce redundancy and promote
consistency across different schemas.
The structured and extensible nature of the H3Net schema ensures it can evolve with the protocol, supporting future enhancements and maintaining compatibility with existing deployments.
Category | Endpoint | Methods |
---|---|---|
acl | /config/acls | GET, POST |
/config/acls/device/{deviceId} | GET, POST | |
/config/acls/{aclId} | GET, PUT | |
config | /config/acls/{deviceId}/{aclName} | GET, PUT, DELETE |
/config/acls/{deviceId}/{aclName}/rules | POST | |
/config/acls/{deviceId}/{aclName}/rules/{ruleId} | PUT, DELETE | |
/config/devices | GET, POST | |
/config/devices/info/bulk | POST | |
/config/devices/{deviceId} | GET, PUT | |
/config/devices/{deviceId}/info | GET, POST | |
/config/devices/{deviceId}/interfaces | GET | |
/config/devices/{deviceId}/interfaces/{interfaceId} | PUT | |
/config/devices/{deviceId}/system | GET, PUT | |
/config/routing | GET, PUT | |
/config/switch | GET, POST | |
/config/vlan | GET, PUT, POST | |
core | /devices | GET, POST |
/devices/{deviceId} | GET | |
/events | POST | |
/health | GET | |
/hello | POST | |
discovery | /discovery/capabilities | GET, POST |
/discovery/capabilities/bulk | POST | |
/discovery/network | GET, POST | |
/discovery/network/neighbors/{deviceId} | GET | |
/discovery/network/options | GET, PUT | |
/discovery/network/topology | GET | |
operations | /operations/state | GET, POST |
/operations/state/{deviceId} | GET, POST | |
/operations/state/{deviceId}/interfaces | GET | |
/operations/state/{deviceId}/reboot | POST | |
/operations/state/{deviceId}/tables | GET | |
pipeline | /config/pipeline | GET, POST |
/config/pipeline/flows | GET, POST | |
/config/pipeline/tables | GET, POST | |
/pipeline/flows | GET, POST | |
/tables | GET, POST | |
/tables/{tableId} | GET, PUT | |
/tables/{tableId}/pipeline | POST | |
routing | /config/routing/all | GET |
/config/routing/routes/device/{routeId} | GET, PUT, DELETE | |
/config/routing/{deviceId} | GET, PUT | |
/config/routing/{deviceId}/bgp | GET, PUT | |
/config/routing/{deviceId}/bgp/neighbors | GET, POST | |
/config/routing/{deviceId}/ospf | GET, PUT | |
/config/routing/{deviceId}/static | GET, POST | |
/config/routing/{deviceId}/validate | POST | |
security | /security/devices/{deviceId}/roles | GET, PUT |
/security/roles | GET, POST | |
/security/roles/{roleName} | GET, PUT, DELETE | |
switch | /config/switches | GET |
/config/switches/{deviceId} | GET, PUT | |
/config/switches/{deviceId}/features | GET, PUT | |
/config/switches/{deviceId}/ports | GET | |
/config/switches/{deviceId}/ports/{portId} | GET, PUT | |
telemetry | /telemetry/interface_stats | POST |
/telemetry/meters | GET | |
/telemetry/metrics | GET, POST | |
/telemetry/metrics/bulk | POST | |
/telemetry/metrics/{deviceId} | GET | |
/telemetry/metrics/{deviceId}/environmental | GET | |
/telemetry/metrics/{deviceId}/resources | GET | |
/telemetry/metrics/{deviceId}/thresholds | GET, PUT | |
/telemetry/stats | GET | |
/telemetry/stats/bulk | POST | |
/telemetry/stats/{deviceId} | GET | |
/telemetry/stats/{deviceId}/interfaces | GET | |
/telemetry/stats/{deviceId}/interfaces/{interfaceId}/counters | GET, POST, DELETE | |
/telemetry/stats/{deviceId}/interfaces/{interfaceId}/errors | GET | |
/telemetry/stats/{deviceId}/interfaces/{interfaceId}/qos | GET | |
vlan | /config/vlans | GET |
/config/vlans/id/{vlanId} | GET, PUT | |
/config/vlans/{deviceId} | GET, POST | |
/config/vlans/{deviceId}/{vlanId} | GET, PUT, DELETE | |
/config/vlans/{deviceId}/{vlanId}/ports | PUT | |
/config/vlans/{deviceId}/{vlanId}/properties | PUT |
The Controller Configuration File in H3Net is a crucial component that defines the devices under the controller’s management and specifies device-specific configurations such as roles, VLANs, ports, and match actions. This configuration is maintained by the administrator and serves as the basis for the controller’s operations.
The configuration file can be written in either JSON or YAML. JSON is preferred for programmatic updates, while YAML is more suitable for manual edits by administrators.
Note: This section needs further details about the configuration schema.
{
"devices": [
{
"device_id": "device-12345",
"roles": ["core", "config", "telemetry"],
"default_role": "core",
"vlans": [
{
"vlan_id": 100,
"name": "Production"
},
{
"vlan_id": 200,
"name": "Development"
}
],
"ports": [
{
"port_id": 1,
"description": "Uplink",
"status": "active"
},
{
"port_id": 2,
"description": "Server Connection",
"status": "active"
}
],
"match_actions": [
{
"match": {
"vlan_id": 100
},
"action": "forward_to_port_1"
}
]
},
{
"device_id": "device-67890",
"roles": ["operations", "security"],
"default_role": "operations",
"vlans": [],
"ports": [],
"match_actions": []
}
]
}
devices:
- device_id: device-12345
roles: ["core", "config", "telemetry"]
default_role: "core"
vlans:
- vlan_id: 100
name: "Production"
- vlan_id: 200
name: "Development"
ports:
- port_id: 1
description: "Uplink"
status: "active"
- port_id: 2
description: "Server Connection"
status: "active"
match_actions:
- match:
vlan_id: 100
action: "forward_to_port_1"
- device_id: device-67890
roles: ["operations", "security"]
default_role: "operations"
vlans: []
ports: []
match_actions: []
vlan_id
and name
.port_id
, description
, and
status
.This comprehensive configuration schema provides the flexibility needed to manage complex network environments effectively, ensuring the H3Net controller operates with the required clarity and precision.
The H3Net Protocol defines a set of operations designed to streamline the management, monitoring, and configuration of network devices through structured messages, role-based access, and standardized control methods. Each protocol operation addresses key functionalities within the protocol, allowing the Control Plane and Dataplane to communicate effectively. This section outlines the various operations supported by H3Net, detailing the purpose, message types, and interactions for each.
The Connection Establishment phase initiates communication between a Dataplane device and the Control Plane.
HelloMessage
to introduce itself to the Control Plane. This
message includes the deviceId
,
protocolVersion
, and other necessary device
attributes.ResponseMessage
, confirming the successful
initiation of communication.This initial handshake establishes a secure, authenticated channel, where the Dataplane acts as the connection initiator, reducing security risks and protecting sensitive configuration data.
The Capability Exchange phase allows the Control Plane to understand the supported functionalities and configuration capabilities of the Dataplane.
CapabilityRequestMessage
to query the device’s supported
capabilities, such as supported telemetry data, configuration options,
and device roles.CapabilityResponseMessage
, listing its capabilities
and identifying any limitations or specific configuration
requirements.The capability exchange enables the Control Plane to tailor its interactions with the device based on its specific functionalities, ensuring effective and optimized communication without unsupported feature requests.
Configuration Management operations allow the Control Plane to apply and retrieve device configurations.
GetConfigMessage
to retrieve the current configuration of a
Dataplane device.GetConfigResponseMessage
, containing the requested
configuration details.DeviceConfigUpdateMessage
, detailing new settings or
updates to existing configurations.ResponseMessage
or ErrorMessage
.This setup allows for efficient retrieval and management of device configurations in real-time without requiring device reboots.
Real-time updates are essential for dynamic network management, enabling the Control Plane to adjust settings as needed.
PipelineUpdateMessage
. This supports real-time
adjustments to the packet processing pipeline without a full
configuration overhaul.This allows the H3Net Protocol to react to network events or changing conditions by applying changes dynamically, improving flexibility and response times.
Monitoring and Telemetry operations collect real-time data on the performance and status of the Dataplane devices.
TelemetryMessage
to the Control Plane, providing data on
device metrics, such as CPU usage, memory, and network throughput.InterfaceStatsMessage
.These monitoring and telemetry operations allow the Control Plane to maintain an up-to-date view of the network, enabling proactive management and troubleshooting.
State Monitoring is critical for tracking device health and operational status, particularly in distributed networks.
StateQueryMessage
,
specifying the type of data requested, such as interface states, ARP
tables, or environmental data.StateQueryResponseMessage
, including the requested
data and status indicators.These state queries provide the Control Plane with real-time insights into device conditions and can be used to identify or troubleshoot network issues effectively.
Event Notifications provide the Control Plane with immediate updates on significant changes or issues within the network.
EventNotificationMessage
to the Control
Plane.link_status_change
, configuration_change
,
pipeline_update_applied
, and user-defined events.Event notifications allow the Control Plane to respond quickly to changes in network status, facilitating prompt remediation or reconfiguration if necessary.
Error Handling ensures robust and reliable communication, managing issues that arise during configuration or operational processes.
ErrorMessage
to the Control Plane. This message
includes the error code, description, and context information.By providing detailed error messages, H3Net supports efficient troubleshooting and minimizes downtime due to configuration errors or unexpected device conditions.
Each protocol operation outlined here ensures that the H3Net Protocol can comprehensively manage network devices, support dynamic configurations, monitor health, and maintain secure, reliable communication across distributed network environments.
The H3Net Protocol defines several core API endpoints that implement the protocol operations. These endpoints are organized by functional area and follow RESTful principles. The key endpoints include:
POST /hello
(operationId: sendHello
):
Establishes initial connection between device and controllerGET /health
(operationId: checkHealth
):
Checks the health status of the systemGET /devices
(operationId: getDevices
):
Retrieves a list of devices, optionally filtered by rolePOST /devices
(operationId:
registerDevice
): Registers a new deviceGET /devices/{deviceId}
(operationId:
getDevice
): Gets details for a specific deviceGET /config/devices
(operationId:
getAllDeviceConfigs
): Gets all device configurationsPOST /config/devices
(operationId:
createOrUpdateDevice
): Creates or updates a deviceGET /config/devices/{deviceId}
(operationId:
getDeviceConfig
): Gets configuration for a specific
devicePUT /config/devices/{deviceId}
(operationId:
updateDeviceConfig
): Updates configuration for a specific
deviceGET /discovery/capabilities/{deviceId}
(operationId:
getDeviceCapabilities
): Gets capabilities of a specific
devicePOST /discovery/capabilities
(operationId:
queryDeviceCapabilities
): Queries device capabilitiesPOST /discovery/capabilities/bulk
(operationId:
queryBulkCapabilities
): Queries capabilities for multiple
devicesGET /discovery/network
(operationId:
getNetworkDiscoveryStatus
): Gets network discovery
statusPOST /discovery/network
(operationId:
performNetworkDiscovery
): Initiates network discoveryGET /discovery/network/topology
(operationId:
getNetworkTopology
): Gets network topologyGET /discovery/network/neighbors/{deviceId}
(operationId: getDeviceNeighbors
): Gets neighbors of a
specific deviceGET /config/switch
(operationId:
getSwitchConfig
): Gets switch configurationPOST /config/switch
(operationId:
updateSwitchConfig
): Updates switch configurationGET /config/switches
(operationId:
getAllSwitches
): Gets all switchesGET /config/switches/{deviceId}
(operationId:
getSwitchConfigById
): Gets configuration for a specific
switchPUT /config/switches/{deviceId}
(operationId:
updateSwitchConfigById
): Updates configuration for a
specific switchGET /telemetry/metrics
(operationId:
getTelemetryMetrics
): Gets telemetry metricsPOST /telemetry/metrics
(operationId:
reportTelemetryMetrics
): Reports telemetry metricsGET /telemetry/stats
(operationId:
getInterfaceStats
): Gets interface statisticsPOST /telemetry/interface_stats
(operationId:
reportInterfaceStats
): Reports interface statisticsGET /operations/state
(operationId:
getOperationalState
): Gets operational statePOST /operations/state
(operationId:
queryDeviceState
): Queries device stateGET /operations/state/{deviceId}
(operationId:
getDeviceOperationalState
): Gets operational state for a
specific devicePOST /operations/state/{deviceId}
(operationId:
querySpecificDeviceState
): Queries state for a specific
deviceGET /security/roles
(operationId:
getRoles
): Gets all rolesPOST /security/roles
(operationId:
createRole
): Creates a new roleGET /security/roles/{roleName}
(operationId:
getRole
): Gets a specific rolePUT /security/roles/{roleName}
(operationId:
updateRole
): Updates a specific roleDELETE /security/roles/{roleName}
(operationId:
deleteRole
): Deletes a specific rolePOST /events
(operationId:
sendEventNotification
): Sends event notificationsThese endpoints form the core of the H3Net Protocol’s RESTful API and implement the operations described in previous sections. Each endpoint follows consistent patterns for request and response handling, error reporting, and authentication.
The H3Net Protocol relies on a structured set of message types defined in JSON to manage interactions between the Control and Dataplanes. These messages enable flexible configuration, monitoring, telemetry, and event handling across a diverse range of network devices. This section details the message formats, the JSON schema definitions for each, and the differences between key configuration messages. The main message categories include:
H3Net Protocol messages are categorized based on their purpose and function. The main types of messages include:
BaseMessage
: Base type for all messages with timestamp
and typeHelloMessage
: Initial connection message with device
identificationResponseMessage
: Standard success responseErrorMessage
: Error reporting with code and
contextEventNotificationMessage
: Notifies the Control Plane of
network events or status changes in real-timeCapabilityRequestMessage
: Queries device
capabilitiesCapabilityResponseMessage
: Reports supported
featuresNetworkDiscoveryMessage
: Network topology
discoveryNetworkDiscoveryResponseMessage
: Reports discovered
devicesSwitchDiscoveryMessage
: Reports discovered switch
configurationsDeviceConfigUpdateMessage
: Updates device settings
including:
RoleUpdateMessage
: Updates device role assignmentsPipelineConfig
: Defines the initial match-action table
sequencePipelineUpdateMessage
: Updates packet processing
rulesMatchActionTable
: Defines packet processing
behaviorFlowEntry
: Individual flow rule definitionsTelemetryMessage
: Reports device metrics and
healthInterfaceStatsMessage
: Interface-specific
statisticsStateQueryMessage
: Queries device state and operational
dataStateQueryResponseMessage
: Reports current state and
operational dataMeterConfig
: Configures traffic metering policiesThese message types are built with a consistent structure to ensure interoperability and efficient parsing by both the Control and Dataplanes.
The H3Net Protocol defines a comprehensive JSON schema for all
message types. These schemas are defined in the
components/schemas
section of the OpenAPI specification and
include:
BaseMessage
(components/schemas/BaseMessage): The
foundation for all messages, containing common fields like
type
, timestamp
, and
schemaVersion
BaseRequest
(components/schemas/BaseRequest): Extends
BaseMessage for request operations, adding requestId
BaseResponse
(components/schemas/BaseResponse): Extends
BaseMessage for responses, adding status
and
requestId
BaseErrorResponse
(components/schemas/BaseErrorResponse): Extends BaseResponse for error
conditions, adding error
and errors
fieldsHelloMessage
(components/schemas/HelloMessage):
Initiates connection from device to controllerHelloResponse
(components/schemas/HelloResponse):
Controller’s response to a HelloMessageCapabilityRequestMessage
(components/schemas/CapabilityRequestMessage): Requests device
capabilitiesCapabilityQueryResponse
(components/schemas/CapabilityQueryResponse): Response containing device
capabilitiesDeviceConfigUpdateMessage
(components/schemas/DeviceConfigUpdateMessage): Updates device
configurationDeviceSettings
(components/schemas/DeviceSettings):
Contains device configuration settingsSwitch
(components/schemas/Switch): Switch-specific
configurationPortConfig
(components/schemas/PortConfig): Port
configuration settingsVLAN
(components/schemas/VLAN): VLAN configurationACL
(components/schemas/ACL): Access Control List
configurationRoutingConfig
(components/schemas/RoutingConfig):
Routing configurationPipelineConfig
(components/schemas/PipelineConfig):
Pipeline configurationPipelineUpdateMessage
(components/schemas/PipelineUpdateMessage): Updates pipeline
configurationMatchActionTable
(components/schemas/MatchActionTable):
Match-action table definitionFlowEntry
(components/schemas/FlowEntry): Flow entry
for match-action tablesTelemetryMessage
(components/schemas/TelemetryMessage):
Contains telemetry metricsInterfaceStatsMessage
(components/schemas/InterfaceStatsMessage): Interface statisticsMeterConfig
(components/schemas/MeterConfig): Meter
configuration for QoSStateQueryMessage
(components/schemas/StateQueryMessage): Queries device stateStateQueryResponseMessage
(components/schemas/StateQueryResponseMessage): Response with device
stateEventNotificationMessage
(components/schemas/EventNotificationMessage): Notifies about
eventsHealthStatusMessage
(components/schemas/HealthStatusMessage): Reports health statusRoleUpdateMessage
(components/schemas/RoleUpdateMessage): Updates role configurationEach message schema defines the structure, required fields, data
types, and validation rules for the corresponding message type. The
schemas use JSON Schema features like $ref
for referencing
common definitions, allOf
for inheritance, and validation
keywords like required
, enum
, and
pattern
.
The complete schema definitions can be found in the h3netschema.json file and its referenced component files.
New message types may be introduced as the protocol evolves. These would be added under well-defined categories to maintain consistency. Examples of potential new message types include:
New messages would follow the protocol’s standard JSON schema format and would require updates to both the schema and validation logic in implementations.
The H3Net Protocol specifies which plane (Control or Data) initiates each message, helping define the protocol flow:
CapabilityRequestMessage
,
DeviceConfigUpdateMessage
,
PipelineUpdateMessage
, StateQueryMessage
HelloMessage
,
CapabilityResponseMessage
, TelemetryMessage
,
EventNotificationMessage
By specifying initiators, the protocol flow remains predictable, and roles are clearly defined, reducing the risk of miscommunication between planes.
The H3Net Protocol leverages WebTransport as its underlying transport mechanism, providing bidirectional communication between clients and servers. While the OpenAPI schema effectively defines client-initiated requests and their expected responses, it does not inherently address server-side handling of client-generated response messages.
This presents a unique challenge in the H3Net Protocol
implementation: how to consistently handle response messages (like
CAPABILITY_QUERY_RESPONSE
) that are sent from clients to
servers but don’t have corresponding API endpoints defined in the
schema. These messages are part of the bidirectional flow but lack
explicit operation mappings in the generated server code.
Traditional REST APIs typically follow a request-response pattern where the client initiates a request and the server responds. However, in the H3Net Protocol’s bidirectional communication model, both clients and servers can initiate messages, and both must handle responses. This bidirectional nature requires a more sophisticated approach to message handling.
To address this challenge, the H3Net Protocol implementation adopts a pattern inspired by WebSocket implementations: the Message Handler Registry Pattern. This approach provides several key benefits:
Decoupling of Message Handling Logic: By separating the message handling logic from the operation mapping logic, the implementation becomes more maintainable and extensible.
Consistent Response Processing: All response messages are handled in a consistent way, regardless of whether they have corresponding operations in the schema.
Extensibility: New message types can be added without modifying the core message handling logic, making the protocol more adaptable to future requirements.
Improved Error Handling: Dedicated handlers for specific message types can implement custom error handling logic appropriate for each message type.
Enhanced Logging and Monitoring: Message-specific handlers can provide detailed logging and monitoring for each message type, improving observability.
The implementation consists of the following components:
Message Handler Type: A function type that defines the signature for message handlers.
type MessageHandler func(session *webtransport.Session, payload interface{}) error
Message Handler Registry: A map that associates message types with their handler functions.
map[string]MessageHandler messageHandlers
Handler Registration: A method to register handlers for specific message types.
func (h *WebTransportHandler) RegisterMessageHandler(messageType string, handler MessageHandler)
Message Dispatch: Logic to dispatch incoming messages to their registered handlers or fall back to the operation mapping approach.
The CAPABILITY_QUERY_RESPONSE
message serves as an
illustrative example of this pattern. When a client responds to a
CAPABILITY_REQUEST
with its capabilities, the server needs
to process this response despite the absence of a corresponding API
endpoint in the schema.
Using the Message Handler Registry Pattern, the server registers a
dedicated handler for CAPABILITY_QUERY_RESPONSE
messages:
.RegisterMessageHandler("CAPABILITY_QUERY_RESPONSE", handler.handleCapabilityQueryResponse) handler
The dedicated handler extracts the device information and capabilities, logs them for debugging purposes, and sends a confirmation response back to the client:
func (h *WebTransportHandler) handleCapabilityQueryResponse(session *webtransport.Session, payload interface{}) error {
// Extract device info
:= extractDeviceId(payload)
deviceId
// Process capabilities
:= extractCapabilities(payload)
capabilities
// Log capabilities for debugging
(deviceId, capabilities)
logCapabilities
// Send confirmation response
return h.sendMessage(session, createCapabilitiesProcessedResponse(deviceId))
}
This approach provides several benefits for H3Net Protocol implementations:
Improved Code Organization: Message handling logic is organized by message type, making the code easier to understand and maintain.
Reduced Complexity: The main message handling function becomes simpler, as it delegates to specific handlers for each message type.
Better Testability: Message handlers can be tested in isolation, making it easier to ensure they work correctly.
Enhanced Extensibility: New message types can be added by simply registering new handlers, without modifying existing code.
Consistent Error Handling: Each message type can have its own error handling logic, appropriate for its specific requirements.
By adopting this pattern, the H3Net Protocol implementation provides a robust and maintainable way to handle bidirectional communication, ensuring that all messages are processed consistently regardless of their origin or destination.
The H3Net Protocol distinguishes between
DeviceConfigUpdateMessage
and
PipelineUpdateMessage
to separate general device
configurations from specific packet processing rule updates.
This separation enables the protocol to handle broad device configurations and packet-specific rules independently, ensuring that device configuration changes don’t interfere with real-time packet processing requirements.
This structured approach to message formats, initiators, and configuration updates ensures that the H3Net Protocol remains flexible, scalable, and secure across a diverse range of network devices.
The H3Net Protocol uses a match-action table structure to enable programmable packet processing pipelines on the Dataplane. This structure allows network devices to apply specific rules to incoming packets based on defined matches and associated actions. The tables are flexible, supporting both standard predefined structures and custom tables that can be adapted to particular use cases or network requirements.
Standard tables provide a set of commonly used match-action structures applicable across various network devices. These tables are defined within the H3Net schema to ensure consistency and interoperability between devices, enabling a unified management approach. Examples of standard tables include:
These tables provide the basic functionality for handling common network requirements, including security filtering, VLAN management, and Layer 2/3 forwarding. By standardizing these tables, the protocol ensures efficient processing and consistency across devices.
Custom tables allow network administrators to define and deploy specialized match-action rules tailored to specific network or application needs. The H3Net schema supports these custom tables, giving administrators flexibility while still adhering to a structured, manageable framework.
The flexibility of custom tables allows the H3Net Protocol to accommodate diverse network environments and use cases, while maintaining a cohesive management framework.
Pipeline processing in the H3Net Protocol refers to the sequence of operations applied to packets as they traverse the device. This is managed through match-action tables that determine the processing steps based on packet characteristics and predefined rules.
Pipeline configuration sets the initial structure and order of match-action tables that packets will encounter as they are processed by the device. This configuration is critical to ensuring that packet handling aligns with network policies and operational goals.
PipelineConfig
message initializes the match-action table
sequence, setting up the processing flow for different packet
types.The pipeline configuration provides a foundation for the packet processing rules, ensuring that all packets are handled efficiently and in alignment with network policies.
The pipeline update mechanism allows dynamic changes to the packet processing rules within an existing pipeline configuration. This mechanism enables real-time updates to the match-action tables without requiring a full device reconfiguration.
PipelineUpdateMessage
allows the Control Plane to apply
incremental updates to the match-action tables. This message includes
specific entries to add, modify, or delete within existing tables.FlowEntry
items can be added or existing entries
modified to adjust packet handling policies as needed.The pipeline update mechanism provides a powerful tool for maintaining an adaptive, policy-driven network that can react quickly to operational needs while avoiding downtime or configuration conflicts.
These sections provide an overview of how the H3Net Protocol structures its match-action tables and manages pipeline processing, enabling efficient, flexible packet handling across diverse network environments.
Security is a central concern for the H3Net Protocol, particularly given its role in managing network configurations, real-time monitoring, and device interactions. This section outlines the security measures necessary to ensure data integrity, prevent unauthorized access, and enable a secure, resilient network environment.
The H3Net Protocol threat model considers various potential attacks and security risks that may compromise the integrity or confidentiality of the network. Key threats include:
The H3Net Protocol mitigates these threats by incorporating role-based access, secure communication channels, and rigorous authentication methods.
To address the authentication support in the H3Net Specification while considering the current and future direction, the following approach can be used:
The H3Net Specification provides several authentication mechanisms to ensure secure communication between the dataplane and the controller. While multiple schemes are currently supported, the long-term goal is to transition towards exclusive certificate-based authentication. This approach offers enhanced security by leveraging cryptographic certificates for identity verification and data integrity.
The H3Net Protocol supports the following authentication schemes:
ApiKeyAuth
: API key passed in X-API-Key headercoreAuth
: For core controller operationsconfigAuth
: For configuration managementtelemetryAuth
: For telemetry data accessoperationsAuth
: For operations managementBearerAuth
: JWT-based bearer token authenticationH3Net supports only client-initiated authentication, with the controller always operating in server mode. This design is crucial for production deployments, as it eliminates the need for IT operations to open internal firewall ports, allowing the controller to connect securely to each dataplane without additional network configuration.
The schema defines various authentication methods, including API key and Bearer token mechanisms. These schemes are categorized based on their application within different roles in the H3Net ecosystem:
X-API-Key
). This method is slated for deprecation
as the specification evolves towards more secure methods.unassignedAuth
: Placeholder for unassigned roles.coreAuth
: API key authentication for core role
operations.configAuth
: API key authentication for configuration
management.telemetryAuth
: API key authentication for telemetry
data access.operationsAuth
: API key authentication for operations
management./oauth/token
and scope h3net:all
.To enhance security and streamline authentication processes, the H3Net Specification will eventually support only certificate-based authentication. This method provides robust security by using digital certificates for mutual authentication, ensuring both the controller and dataplane can securely identify each other.
Devices can operate in one of two modes for certificate authentication:
In all configurations, device dataplane acts in the “client” mode, while the controller operates in the “server” mode.
While the current authentication schemes provide necessary functionality, they are marked for deprecation as the specification progresses towards the exclusive use of certificate-based methods. Stakeholders should plan for a phased migration to ensure a smooth transition without impacting operations.
The H3Net Protocol requires robust encryption and authentication mechanisms to ensure secure communication and protect data integrity.
These encryption and authentication standards reduce the risk of unauthorized access and interception, making H3Net communication resilient against external threats.
This approach ensures that the H3Net Specification remains flexible, secure, and future-proof, accommodating current needs while planning for long-term security enhancements.
H3Net Protocol implements Role-Based Access Control (RBAC) to enforce fine-grained permissions, limiting users and devices to specific APIs and operations. RBAC supports scalability by allowing for custom roles, each with unique access levels, preventing unauthorized access to critical configuration and telemetry data.
Controllers in H3Net Protocol are categorized by function and level of access, ensuring that roles align with the controller’s purpose:
Controller roles define the specific functionalities available to the dataplane, primarily for security purposes, while also optimizing functionality. By isolating functionalities, these controller types reduce the risk of excessive permissions and enforce the principle of least privilege. Additionally, these controllers seamlessly integrate with various applications and data sources to enhance their capabilities. For example, a telemetry controller might feed data into a real-time analytics platform like Prometheus, while a core controller could integrate with a DHCP server to dynamically manage network leases. This northbound integration is built directly into the controller, enabling efficient and secure network management.
Each controller and device role defines specific permissions, ensuring that only authorized entities can perform certain actions:
Role assignment and permission restrictions prevent unauthorized actions, creating a more secure, managed environment for network operations.
The H3Net Controller operates based on a configuration file provided by the administrator. This configuration file contains a list of devices that the controller is responsible for managing. Each device entry includes:
When a device sends a RoleUpdateMessage
to the
controller, the following steps occur:
The primary challenge is ensuring the controller correctly maps roles to devices, especially in dynamic environments. The enumerated list of roles and the mandatory default role provide a structured way to handle this complexity, ensuring the controller always knows how to manage each device.
{
"devices": [
{
"device_id": "device-12345",
"roles": ["core", "config", "telemetry"],
"default_role": "core"
},
{
"device_id": "device-67890",
"roles": ["operations", "security"],
"default_role": "operations"
}
]
}
Certificate-based mutual authentication is employed for secure communication between Control and Dataplanes:
Certificate authentication strengthens security by verifying identities and ensuring only trusted entities communicate over the H3Net Protocol.
API catalogs define which APIs are accessible by specific roles. For example:
DeviceConfigUpdateMessage
and
GetConfigMessage
, accessible only by controllers with the
Config role.Each catalog enforces strict access control, reducing the risk of unauthorized access to sensitive network management functions.
To ensure the secure implementation of the H3Net Protocol, the following best practices are recommended:
The H3Net Protocol defines several security schemes in the OpenAPI
specification (h3netschema.json
) to enforce authentication
and authorization:
coreAuth
: API key for the core role, granting full
access to all API endpointsconfigAuth
: API key for the config role, allowing
access to configuration-related endpointstelemetryAuth
: API key for the telemetry role,
permitting access to telemetry and monitoring endpointsoperationsAuth
: API key for the operations role,
enabling access to operational command endpoints/oauth/token
h3net:all
for full access to all API
endpointsApiKeyAuth
: Generic API key authenticationBearerAuth
: JWT-based bearer token authenticationEach API endpoint in the H3Net Protocol specifies which security schemes are required for access, ensuring that only properly authenticated and authorized clients can interact with the endpoints. The security schemes align with the RBAC model, enforcing the principle of least privilege by restricting access based on the client’s assigned role.
By following these practices, organizations can ensure that the H3Net Protocol operates securely, minimizing risk and supporting robust network management capabilities.
Error handling and resilience are crucial for the stability and reliability of the H3Net Protocol. Effective error handling ensures smooth operations, minimizes downtime, and facilitates quick recovery from failures. This section provides guidelines for error management, failover processes, and conformance requirements to maintain protocol reliability and fault tolerance across diverse network environments.
Error handling in the H3Net Protocol is designed to manage expected and unexpected issues that may arise during device configuration, telemetry, and pipeline updates. H3Net defines specific error responses for different failure scenarios:
Structured Error Responses: Errors are
communicated using ErrorMessage
, which includes fields such
as errorCode
, errorMessage
,
timestamp
, and optional context
and
causes
. This structure enables standardized error reporting
across devices and controllers.
Error Code Definitions: Each error code corresponds to a specific type of issue (e.g., authentication failure, configuration error, telemetry timeout). Consistent error codes allow for easy interpretation and streamlined debugging processes.
Error Propagation: The Control and Dataplanes must handle errors gracefully and propagate meaningful error messages back to the initiating plane. For example, if a configuration update fails on the Dataplane, an error message should be sent to the Control Plane for troubleshooting.
Retry Mechanism: In cases of temporary issues (e.g., connectivity loss, timeouts), the protocol allows for limited retries with exponential backoff to avoid overwhelming the network. Retrying helps ensure eventual success without compromising network stability.
Error Logging and Monitoring: Both planes should maintain detailed logs of errors, including error type, affected messages, and timestamps. Centralized logging assists in diagnosing recurring issues, identifying root causes, and optimizing error resolution processes.
Error handling in the H3Net Protocol emphasizes clarity, consistency, and fault isolation, allowing errors to be quickly identified, communicated, and addressed.
HTTP Status | Error Type | Typical Causes |
---|---|---|
400 | Data Validation Failed | Invalid input format/values |
401 | User Not Authenticated | Missing/invalid authentication credentials |
403 | Permission Check Failed | Role lacks required permissions |
404 | Resource Not Found | Requested device/configuration missing |
409 | Business Rule Conflict | Conflicting configuration rules |
415 | Unsupported Data Format | Invalid Content-Type header |
500 | Internal Server Error | Unexpected system failure |
All errors follow the standard error format:
{
"errorCode": "H3NET-403",
"errorMessage": "Insufficient permissions for requested operation",
"timestamp": "2025-02-08T12:34:56Z",
"details": {
"required_role": "NetworkAdmin",
"attempted_operation": "/config/switches/switch-01"
}
}
Resilience in the H3Net Protocol is achieved through advanced failover mechanisms and conflict resolution strategies, ensuring uninterrupted operations even during controller or network failures.
Controller Idempotency and Failover: H3Net employs idempotent role-based controllers, designed for deployment in a distributed architecture. This approach simplifies state management and eliminates the complexities of traditional control plane synchronization. A complete control-plane upgrade can be performed while the network is running, taking only a fraction of a second. During this process, dataplanes operating in fail-secure mode remain unaffected. In fail-secure mode, the dataplane continues forwarding packets using the last known good configuration, ensuring uninterrupted service even if the control plane temporarily loses connectivity or undergoes an upgrade.
In the event of a primary controller failure—due to unresponsiveness, network partitioning, or scheduled maintenance—a secondary controller seamlessly takes over. Failover is triggered by health checks and inactivity timeouts, typically set to 30 seconds, ensuring minimal disruption to network operations.
Seamless Controller Promotion: Upon failover, the secondary controller is automatically promoted to primary status based on predefined criteria. This process minimizes service disruption, as the Dataplane is immediately notified of the controller change, establishing a new active connection with the promoted controller.
Robust Conflict Resolution Policies: H3Net implements effective conflict resolution to handle scenarios involving multiple controllers:
Efficient Data Synchronization: Post-failover, the newly promoted controller synchronizes its configuration state with the Dataplane to maintain operational consistency. This synchronization ensures that all management operations remain cohesive, preventing any configuration mismatches that could compromise network stability.
The failover and conflict resolution mechanisms in H3Net are crucial for sustaining protocol resilience. They enable the system to handle both planned and unexpected disruptions gracefully, ensuring continuous operation without compromising security or stability.
Conformance requirements establish the baseline functionality that must be supported by all H3Net-compliant devices and controllers to ensure interoperability and protocol fidelity.
Message Structure Compliance: All devices and controllers must adhere to the JSON schema definitions specified in the protocol, including mandatory fields, data types, and enumerations.
Error Message Implementation: Devices and
controllers must implement ErrorMessage
and provide
accurate error codes and messages for all recognized issues.
Unrecognized or unexpected errors should trigger generic error codes for
graceful handling.
RBAC and API Access Control: Controllers must implement Role-Based Access Control (RBAC) as defined by the protocol, ensuring only authorized roles can access certain APIs. RBAC is essential for security and operational consistency across diverse network devices.
Protocol State Machine Adherence: All devices should follow the state transitions defined in the protocol’s state machine (e.g., Initialization, Capability Exchange, Active Configuration). Adherence to these states ensures predictable behavior across devices.
Telemetry and Event Notification Support: Devices must support telemetry reporting and event notifications as specified, enabling real-time monitoring by the Control Plane. This requirement is essential for maintaining operational visibility and tracking network performance.
Failover Readiness: Primary and secondary controllers must be configured to handle failover scenarios per the protocol’s guidelines. They should respond to promotion and demotion commands in a manner that minimizes service disruption.
These conformance requirements establish a standard level of functionality across all H3Net deployments, ensuring that devices and controllers interact consistently and predictably within the protocol ecosystem.
The H3Net Protocol’s error handling, resilience, and conformance standards are designed to maintain high availability, enable rapid recovery, and ensure compliance across all network components. This approach provides a strong foundation for reliable, secure, and standardized network management.
The H3Net Protocol offers a flexible yet standardized approach for implementing network control and Dataplanes. These guidelines provide developers and network engineers with recommendations for effective implementation, focusing on protocol compatibility, scalability, and security.
The Control Plane serves as the command center for managing, configuring, and monitoring Dataplane devices. Effective implementation of the Control Plane includes:
Role-Based Access Control (RBAC): Implement RBAC to restrict API access based on the user’s role (e.g., Core, Config, Telemetry, Operations). RBAC ensures that each controller’s scope of operations aligns with its designated functions, minimizing security risks.
Configuration and Telemetry Management: Develop
API endpoints to handle both configuration updates
(DeviceConfigUpdateMessage
) and telemetry requests
(TelemetryMessage
, InterfaceStatsMessage
).
Ensure the configuration API supports GetConfig
and
SetConfig
operations to manage device settings
comprehensively.
Message Handling and Validation: Implement message validation using the JSON schema definitions specified in the protocol. Validation ensures that each message meets schema requirements, preventing malformed requests from causing errors or vulnerabilities.
Logging and Auditing: Enable logging for all significant interactions, including configuration changes, telemetry requests, and errors. Detailed logs support troubleshooting and can help in compliance audits by tracking user actions and system responses.
Controller Failover and Health Checks: Develop mechanisms for monitoring controller health and performing failover when the primary controller becomes unavailable. Health checks should monitor controller responsiveness and trigger a switchover to secondary controllers as needed.
These guidelines ensure that the Control Plane can manage diverse devices securely and efficiently while providing redundancy for high availability.
The Dataplane is responsible for packet processing, telemetry reporting, and responding to configuration commands from the Control Plane. To implement a robust Dataplane:
Connection and Initialization: Implement the
connection initiation logic to send a HelloMessage
to the
Control Plane upon startup. This establishes a secure connection and
triggers the protocol’s initialization state.
Pipeline Processing and Match-Action Tables: Set
up standard and custom match-action tables to define how packets should
be processed. The tables should be flexible enough to accommodate
dynamic updates from the PipelineUpdateMessage
and
DeviceConfigUpdateMessage
.
Telemetry Collection and Reporting: Implement
periodic telemetry reporting for essential device metrics (e.g.,
interface stats, resource usage). Telemetry data should be sent in
TelemetryMessage
and InterfaceStatsMessage
formats to the Control Plane.
Error Handling and Logging: Design
error-handling routines to respond to invalid or unexpected Control
Plane commands. Errors should be communicated back to the Control Plane
using ErrorMessage
, with appropriate logging for
analysis.
RBAC Compliance: Enforce RBAC restrictions locally within the Dataplane to ensure that each type of message or command aligns with the controller’s assigned role.
These guidelines ensure that the Dataplane remains responsive, secure, and aligned with H3Net’s protocol standards.
Integrating the H3Net Protocol with vendor-specific devices requires adapting the protocol’s standard messages and functions to each device’s unique APIs, firmware, and hardware capabilities.
Abstracted Vendor API Layer: Develop an abstraction layer between the H3Net Protocol and the vendor’s native API. This layer translates H3Net Protocol commands into device-specific commands, allowing H3Net to interact seamlessly with diverse hardware.
Capability Detection: Implement a
CapabilityResponseMessage
that accurately reports the
vendor device’s capabilities. This allows the Control Plane to determine
which features are supported by each device, such as telemetry data
types or configuration options.
Consistent Device Identification: Standardize
how device IDs (deviceId
, switchId
, etc.) are
reported to the Control Plane across vendors. Consistent identifiers
help the Control Plane accurately manage and configure devices.
Extended Support for Device-Specific Actions:
Where possible, extend the protocol’s message types to support unique
vendor features, like specific logging mechanisms or custom telemetry
types, using EventNotificationMessage
or
DeviceConfigUpdateMessage
with vendor-specific
fields.
Testing and Conformance Validation: Verify the integration with vendor devices by testing each protocol feature, such as message handling, configuration updates, and telemetry. Confirm that vendor devices can handle both expected and edge-case scenarios according to the H3Net specification.
These integration guidelines facilitate smooth operation across multiple vendors while maintaining the consistency and interoperability of the H3Net Protocol.
NAPALM (Network Automation and Programmability Abstraction Layer with Multivendor support) provides a framework for interacting with network devices through a unified API. While NAPALM is a powerful community driven open source tool for network automation, its limitations — ranging from partial vendor support, lack of real-time event-driven automation, limited device/network services support and inconsistent feature implementation to scalability and security concerns — highlight the need for careful evaluation and supplemental strategies when deploying it in complex or large-scale environments. A NAPALM-like integration for H3Net which addresses these limitations can further streamline multi-vendor support and enable flexible, extensible management.
Unified Interface for Device Interaction:
Develop a single API layer that abstracts device-specific commands,
using NAPALM’s model of abstracted methods for device operations (e.g.,
get_interfaces
, load_config
,
commit_config
). This layer allows H3Net to perform standard
tasks regardless of vendor-specific details.
Multi-Vendor Compatibility: Using NAPALM-like abstraction allows H3Net to work across diverse devices, standardizing the configuration and telemetry retrieval process. For example, methods for retrieving interface statistics or updating configuration should remain consistent across devices.
Error and Exception Handling: Implement a
consistent error-handling model for exceptions encountered during
NAPALM-style interactions. Map exceptions to H3Net’s
ErrorMessage
structure to keep error reporting
standardized.
Automated Testing and Validation: Ensure that NAPALM-like methods are thoroughly tested across devices. This may include automated test suites to verify compatibility, message conformity, and response consistency with the H3Net Protocol.
Event Notification and Telemetry Integration:
Implement event notification methods and telemetry gathering according
to H3Net’s TelemetryMessage
and
EventNotificationMessage
structures, ensuring that
NAPALM-like methods support real-time updates and reporting.
By adopting NAPALM-like integration techniques, H3Net achieves a high degree of flexibility, multi-vendor compatibility, and streamlined management, enabling more efficient automation across heterogeneous network environments.
These implementation guidelines for the Control Plane, Dataplane, vendor-specific integration, and NAPALM-like compatibility ensure that the H3Net Protocol operates smoothly across diverse network infrastructures, enabling reliable, scalable, and secure network management.
To enable testing of dataplane implementations, a test suite is
provided that can be used to verify the implementation of the H3Net
Protocol. The test suite is expected to be written in Go
language and will be available in the H3Net repository.
The H3Net Protocol is designed to handle diverse network management and configuration scenarios, from routine network configurations to advanced pipeline management and telemetry monitoring. This section explores common use cases to demonstrate the protocol’s flexibility and capabilities across various network environments.
The H3Net Protocol simplifies and standardizes network configuration management, allowing administrators to handle device configurations in a consistent, centralized way.
VLAN Configuration: Using
DeviceConfigUpdateMessage
, administrators can assign VLANs
to specific ports on switches and routers. VLAN tables allow easy
configuration and management of VLAN tagging, routing, and isolation.
This is especially useful in multi-tenant environments where VLANs
separate traffic from different groups.
Access Control Lists (ACLs): ACLs are configured
through the Port ACL Table
in H3Net’s match-action tables.
The protocol allows administrators to define traffic filtering rules for
security and compliance, blocking unauthorized access to network
segments or applying filtering policies at the network edge.
IP Address Management (IPAM): With
DeviceConfigUpdateMessage
, the Control Plane can push IP
address assignments (such as DHCP, NTP, DNS servers to use) to devices,
ensuring consistent IP management across routers, firewalls, and other
network infrastructure. This could also be in coordination with DHCP
servers or use the configuration information to validate against DHCP
leases. This is useful for maintaining centralized control over IP
resources and enforcing IP-based security policies.
Device Role Assignment: H3Net allows for flexible role assignment based on device capabilities. For example, assigning specific device roles (e.g., switch, router, firewall) enables the Control Plane to understand each device’s functions, optimize configuration commands, and deliver role-specific configurations.
Centralized Policy Management: Policy configurations can be centrally managed by defining standard rules for firewall, routing, and access control. Policies can be updated dynamically through the protocol, allowing for rapid adjustments to the network based on changing security requirements or organizational needs.
These common network configurations demonstrate H3Net’s ability to streamline and unify management tasks across diverse devices.
Pipeline management is central to controlling packet processing behavior within the Dataplane. The H3Net Protocol’s match-action tables allow administrators to define and manage the packet processing pipeline in a flexible, vendor-neutral way.
Dynamic Rule Updates: H3Net’s
PipelineUpdateMessage
enables real-time adjustments to
match-action tables. This is useful for responding to changing network
conditions or applying traffic management policies dynamically without
needing a full configuration reset.
QoS and Traffic Prioritization: With custom match-action tables, administrators can define rules for Quality of Service (QoS), ensuring that critical traffic (e.g., VoIP or video) receives higher priority in the network. Pipeline updates allow for quick adjustments in traffic prioritization based on demand.
Advanced Packet Filtering: By utilizing ACL and IP FIB tables, H3Net allows for granular packet filtering. This is particularly valuable in security-sensitive environments where traffic must be inspected and filtered based on specific attributes like protocol, IP address, or port.
Session-Based Traffic Control: Custom tables can manage session-based traffic, such as restricting the number of active sessions per user or device, enabling load balancing across sessions, or prioritizing certain sessions based on protocol. Session tracking in the pipeline improves security and ensures fair resource allocation.
Port/Packet Mirroring for Debugging and Compliance: H3Net enables configurable port/packet mirroring, allowing for real-time duplication of traffic to monitoring devices. This feature supports both compliance audits and debugging by capturing packet flows. Mirroring configurations can be applied at the pipeline level and can be dynamically updated to meet changing requirements.
Pipeline management with H3Net provides the flexibility needed for efficient, secure, and high-performance network traffic handling in real-time.
H3Net’s telemetry capabilities support continuous monitoring of network performance and health, providing insights for proactive management and rapid response to issues.
Real-Time Performance Monitoring:
TelemetryMessage
and InterfaceStatsMessage
provide critical performance data like bandwidth utilization, packet
loss, and error rates. This enables administrators to monitor network
health in real-time and respond to performance bottlenecks
quickly.
Environmental Monitoring for Network Equipment: Telemetry messages can include environmental data (e.g., temperature, humidity), which is critical for monitoring devices in physical environments such as data centers. The Control Plane can detect and alert if thresholds are exceeded, enabling rapid intervention to prevent device failure.
Traffic Analysis and Anomaly Detection: H3Net telemetry enables traffic pattern analysis, helping to identify abnormal traffic flows that may indicate network attacks, configuration issues, or device malfunctions. Monitoring tools can use this data to detect threats early and alert administrators.
Device Health and Resource Utilization: H3Net supports telemetry for device-specific metrics such as CPU usage, memory consumption, and disk utilization. This data helps administrators monitor resource usage, identifying underused or overburdened devices and planning for capacity needs.
Automated Alerts and Threshold-Based Actions:
Telemetry monitoring can be configured to trigger alerts when specific
thresholds are met (e.g., CPU load above 90%). H3Net’s event
notification system can then issue EventNotificationMessage
to the Control Plane, prompting automated responses such as load
balancing, traffic rerouting, or additional resource
allocation.
Predictive Maintenance: Telemetry data, combined with historical data, can support predictive maintenance by identifying patterns that lead to device failure or performance degradation. Administrators can use this information to schedule maintenance before critical issues arise, reducing downtime and enhancing reliability.
H3Net’s telemetry capabilities offer extensive monitoring and alerting options, enabling proactive network management and optimized resource utilization.
H3Net empowers AI/ML pipelines by providing direct access to its telemetry messages and state query responses, enabling seamless integration for training, analysis, and prediction. Real-time streaming telemetry allows AI models to monitor live network metrics, detect anomalies as they occur, and proactively address potential issues. By analyzing dynamic pipeline updates, AI systems can predict configuration problems or performance bottlenecks and suggest optimizations, such as traffic re-routing, load balancing, or QoS adjustments. H3Net’s telemetry and state data also allow AI models to evaluate the impact of changes before implementing them, ensuring informed decision-making.
In the realm of security, AI/ML models can leverage H3Net’s firewall and ACL configurations, combined with real-time state data, to predict and prevent security breaches. Dynamic rule updates via H3Net enable instant enforcement of security policies, allowing networks to adapt to evolving threats in real-time.
H3Net’s unified, vendor-neutral protocol eliminates integration challenges, simplifying the deployment of AI-driven solutions across multi-vendor environments. Its integration with asset management systems and other enterprise tools enriches contextual data about devices, locations, and configurations, feeding advanced AI models for predictive maintenance, capacity planning, and compliance auditing.
By enabling closed-loop automation, H3Net allows AI models to detect, decide, and act in real time through its robust control plane. This capability includes dynamically configuring pipelines, modifying routing, and enforcing security policies autonomously. AI systems can analyze telemetry data to identify patterns of hardware degradation or performance issues, generating predictive alerts for proactive maintenance and optimal resource utilization.
H3Net reduces operational overhead by unifying network management, enabling AI/ML systems to interact with a single protocol for diverse devices. This unified approach enhances ROI for AI/ML initiatives by streamlining their integration into network management workflows. H3Net’s open-source nature and standardized schema accelerate AI/ML adoption, empowering network teams to experiment with cutting-edge algorithms without overhauling existing infrastructure.
These use cases highlight the versatility of the H3Net Protocol in addressing common and advanced network management scenarios, demonstrating its ability to handle complex configurations, flexible pipeline management, and robust telemetry monitoring.
Handling protocol and schema versioning is essential for ensuring compatibility and smooth operation as the H3Net Protocol evolves. Since the dataplane client initiates the connection to the controller, a clear strategy for managing versioning is vital to accommodate potential differences between dataplane and controller software versions. Effective versioning and compatibility management ensure H3Net Protocol deployments can evolve without disrupting existing network operations or breaking interoperability between control and dataplanes. This section outlines the versioning conventions and compatibility practices necessary for robust protocol management.
POST /control HTTP/3
Host: controller.company.com
H3Net-Protocol-Version: 1.0
Content-Type: application/json
HTTP/3 200 OK
Content-Type: application/json
H3Net-Protocol-Version: 1.0
H3Net-Protocol-Version: 1.0
.H3Net-Protocol-Version: 1.1
(if backward-compatible) or 400 Bad Request
with a list of
supported versions if not.schema_version
field to specify
the schema version.{
"schema_version": "1.0",
"match_action_tables": [
{
"table_name": "vlan",
"entries": [
{"match": {"vlan_id": 100}, "action": "forward_to_port_1"}
]
}
]
}
protocolVersion
) shared during the initial
HelloMessage
handshake between the Control and Dataplanes.
This identifier allows components to verify compatibility before further
interactions.The versioning and compatibility practices for H3Net Protocol provide a robust framework for iterative improvements while ensuring operational continuity across protocol versions.
This section provides key references for understanding the standards, related technologies, and foundational resources relevant to the H3Net Protocol.
These RFCs provide foundational information on HTTP and TLS, which are integral to the H3Net Protocol’s communication and security architecture.
These related technologies provide context for the H3Net Protocol’s objectives and design principles, offering complementary and alternative solutions for network management.
ACL (Access Control List): A set of rules that control network traffic, typically used for security filtering by defining allowed or denied traffic.
Backoff: A delay mechanism, often exponential, used in retry algorithms to prevent overload during repeated connection attempts.
Capability Exchange: A process in which devices share their supported functionalities with the Control Plane to determine compatible operations.
Dataplane: The component in network architecture responsible for processing and forwarding data packets based on defined rules.
Failover: The process of switching to a standby system or component when the primary system fails, ensuring service continuity.
gNMI (gRPC Network Management Interface): A protocol for network configuration and telemetry over gRPC, commonly used for monitoring network devices.
HTTP/3: The third major version of the Hypertext Transfer Protocol, built on QUIC for faster and more secure connections.
JSON Schema: A vocabulary for defining the structure of JSON documents, used to validate message formats in H3Net Protocol.
Match-Action Table: A table structure used in programmable network devices to define actions based on specific packet characteristics.
NAPALM: A network automation library that abstracts vendor-specific APIs into standardized methods for managing network devices.
RBAC (Role-Based Access Control): A method for restricting system access based on the roles of individual users or systems, ensuring security and operational control.
Telemetry: Data collected from devices about their operational status, performance, and health, used for monitoring and analytics.
TLS (Transport Layer Security): A protocol for securing communications between networked applications, ensuring privacy and data integrity.
VLAN (Virtual Local Area Network): A technology that partitions a network into distinct segments, often used to isolate traffic for security or organizational purposes.
This glossary provides definitions for key terms and concepts within the H3Net Protocol, aiding in clarity and understanding for implementers and network operators.
The appendices provide supplementary information to support the H3Net Protocol specification, including visual representations of architecture and flow through ASCII diagrams and example configurations for practical implementation.
The following ASCII diagrams illustrate the high-level architecture, protocol flow, and state machine for the H3Net Protocol, offering a visual overview of interactions between the Control and Dataplanes and various protocol components.
High-Level Architecture
+---------------------------+
| Control Plane |
| |
| +-----------------------+ |
| | Core Controller | |
| |-----------------------| |
| | Config Controller | |
| | Telemetry Controller | |
| | Operations Controller | |
| +-----------------------+ |
+---------------------------+
|
|
| HTTP/3 with JSON
v
+---------------------------+
| Dataplane |
| |
| +-----------------------+ |
| | Device Roles | |
| | - Switch | |
| | - L2 Switch | |
| | - Router | |
| | - Firewall | |
| | - UTM | |
| | - Wireless AP | |
| | - VoIP (Phone) | |
| | - Load Balancer | |
| | - VPN Gateway | |
| | - Power Dist Unit | |
| +-----------------------+ |
| |
+---------------------------+
Protocol Flow Overview
+-----------------------------+
| Control Plane |
+-----------------------------+
| |
| 1. Initiate HelloMessage |
|---------------------------->|
| |
| 2. CapabilityExchange |
|<----------------------------|
| |
| 3. ConfigUpdate |
|---------------------------->|
| |
| 4. Telemetry Request |
|---------------------------->|
| |
| 5. Error Handling |
|<----------------------------|
| |
+-----------------------------+
Protocol State Machine
+-------------------------+
| INIT STATE |
+-------------------------+
|
| HelloMessage
v
+-------------------------+
| CAPABILITY EXCHANGE |
+-------------------------+
|
| CapabilityResponse
v
+-------------------------+
| ACTIVE STATE |
+-------------------------+
|
| Config/Telemetry
|
+-------------------------+
| ERROR STATE |
+-------------------------+
These diagrams outline the primary components and flow, helping users visualize how the protocol operates in both routine and error scenarios.
Example configurations provide sample JSON messages and configurations to demonstrate practical H3Net Protocol use cases. These examples cover standard configurations, telemetry settings, and error handling for easy reference.
Example Configuration for VLAN Assignment
{
"type": "DeviceConfigUpdateMessage",
"timestamp": "2024-01-15T12:34:56Z",
"deviceId": "switch-01",
"config": {
"vlan": {
"id": 10,
"name": "Sales VLAN",
"untaggedPorts": [1, 2, 3],
"taggedPorts": [10, 11]
}
}
}
This message assigns VLAN 10 to ports on a switch, marking certain ports as untagged for VLAN traffic and others as tagged.
Example Telemetry Request
{
"type": "TelemetryMessage",
"timestamp": "2024-01-15T13:45:00Z",
"deviceId": "router-01",
"metrics": {
"interfaceStats": true,
"cpuUsage": true,
"memoryUsage": true
}
}
This telemetry message requests interface statistics, CPU usage, and memory usage data for real-time monitoring.
Error Handling Example
{
"type": "ErrorMessage",
"timestamp": "2024-01-15T14:55:00Z",
"errorCode": 403,
"errorMessage": "Access Denied",
"context": "Unauthorized access to Config Controller",
"causes": [
"Invalid permissions for API call",
"Role mismatch for attempted configuration"
]
}
This example illustrates an error message indicating access denial, including context and possible causes for diagnostic purposes.
Example Configuration for Role-Based Access
{
"type": "RoleUpdateMessage",
"timestamp": "2024-01-15T15:10:00Z",
"deviceId": "firewall-02",
"role": "Telemetry Controller",
"permissions": ["GET /telemetry/*", "POST /eventNotification"]
}
This role update message assigns specific telemetry-related permissions to a controller interacting with a firewall device.
Pipeline Update Example for Traffic Filtering
{
"type": "PipelineUpdateMessage",
"timestamp": "2024-01-15T16:00:00Z",
"deviceId": "switch-02",
"tableName": "Port ACL Table",
"flowEntry": {
"priority": 100,
"match": {
"ipSrc": "192.168.1.0/24",
"ipDst": "10.0.0.0/24",
"protocol": "TCP"
},
"action": "drop"
}
}
This configuration updates the pipeline to drop TCP traffic between specific IP ranges, enforcing security policies at the switch level.
These examples provide practical reference points for implementing and troubleshooting H3Net Protocol configurations across various network devices and scenarios. They demonstrate how to configure devices, manage telemetry, handle errors, and apply access controls, all while adhering to the H3Net specification.