Connection Versions in v2

Slides:



Advertisements
Similar presentations
Pi4soa Implementation Issues WS-CDL Candidate Recommendation December 2005 Pi4 Technologies Ltd.
Advertisements

Symbol Table.
Batches, Scripts, Transactions-SQL Server 7. A batch is a set of Transact-SQL statements that are interpreted together by SQL Server. They are submitted.
© 2006 Open Grid Forum Network Service Interface in a Nut Shell GEC 19, Atlanta, GA Presenter: Chin Guok (ESnet) Contributors: Tomohiro Kudoh (AIST), John.
Module R2 CS450. Next Week R1 is due next Friday ▫Bring manuals in a binder - make sure to have a cover page with group number, module, and date. You.
Tutorial 6 & 7 Symbol Table
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Hands-On Microsoft Windows Server 2003 Networking Chapter 5 Dynamic Host Configuration Protocol.
The POSTGRES Next - Generation Database Management System Michael Stonebraker Greg Kemnitz Presented by: Nirav S. Sheth.
Managing DHCP. 2 DHCP Overview Is a protocol that allows client computers to automatically receive an IP address and TCP/IP settings from a Server Reduces.
SOFTWARE TESTING STRATEGIES CIS518001VA : ADVANCED SOFTWARE ENGINEERING TERM PAPER.
Chapter 2 The process Process, Methods, and Tools
Chapter 6 Introduction to Defining Classes. Objectives: Design and implement a simple class from user requirements. Organize a program in terms of a view.
SIP working group IETF#70 Essential corrections Keith Drage.
Chapter 5 Introduction to Defining Classes
Chapter 3: Developing Class Methods Object-Oriented Program Development Using Java: A Class-Centered Approach.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Session Identifier Date Submitted: February xx, 2006 Presented.
Oasis, Hursley, January Andrew Banks MQTT 256 Message Format indication and message metadata in general. MQTT 249 Add expiry capabilities to MQTT.
Oasis, Hursley, January Andrew Banks MQTT 256 Message Format indication and message metadata in general. MQTT 249 Add expiry capabilities to MQTT.
NSI Service Definition Federation of providers A group of network providers get together and decide that they wish to offer a multi-domain connection services.
© 2006 Open Grid Forum Network Services Interface CS Errata Guy Roberts, Chin Guok, Tomohiro Kudoh 29 Sept 2015.
1 Network Services Interface An Interface for Requesting Dynamic Inter- datacenter Networks Tomohiro Kudoh (AIST) Guy Roberts (DANTE) Inder Monga (ESnet)
© 2007 Open Grid Forum NSI CS Protocol State Machine Message Handling OGF 37.
© 2006 Open Grid Forum Network Services Interface Policy-based routing enforcement John MacAuley, ESnet 4 th February 2015.
Distributed Databases – Advanced Concepts Chapter 25 in Textbook.
D-Link Wireless AP with NAP 802.1x solution
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Software Configuration Management
Software Project Configuration Management
Exposing Link-Change Events to Applications
OGF PGI – EDGI Security Use Case and Requirements
Archiving and Document Transfer Utilities
Operating Systems Protection Alok Kumar Jagadev.
Transaction Management
Physical Data Model – step-by-step instructions and template
Direct Attached Storage and Introduction to SCSI
SCC P2P – Collaboration Made Easy Contract Management training
Network Services Interface
A Deterministic End to End Performance Verification Architecture
NSI Service Definition
Section 8 Discussion Points
COS 561: Advanced Computer Networks
Magento Technical Guidelines Eugene Shakhsuvarov, Software Magento
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
Template library tool and Kestrel training
Lesson 25: Task Management
This pointer, Dynamic memory allocation, Constructors and Destructor
© 2002, Cisco Systems, Inc. All rights reserved.
Direct Attached Storage and Introduction to SCSI
Chapter 4: Access Control Lists (ACLs)
Object-Oriented Analysis
Network Services Interface
Chapter 24 Testing Object-Oriented Applications
Updating GML datasets S-100 WG TSM September 2017
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
6 Chapter Functions.
Chapter 19 Testing Object-Oriented Applications
Static Class Members March 29, 2006 ComS 207: Programming I (in Java)
William Stallings Data and Computer Communications
Chapter 19 Testing Object-Oriented Applications
Transactions and Concurrency
Methods.
Transmission Workgroup 6th March 2014
IPP Reprint Password Use Cases
Object Oriented System Design Class Diagrams
Java Methods: A Deeper Look Academic 2019 Class: BIT23/BCS10 Chapter 06 Abdulaziz Yasin Nageye Faculty of Computing Java How to Program, 10/e 1 © Co py.
Triggers 7/11/2019 See scm-intranet.
IPP Job Storage 2.0: Fixing JPS2
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
and Forecasting Resources
Presentation transcript:

Connection Versions in v2

Don’t Panic! What you are about to see is a behaviour model – not a required software design. It only poses internal structure as an example!

Diagramatical terms 3-level service tree model NSA NSA NSA NSA NSA “Originating” NSA NSA 3-level service tree model RA PA NSA “Local” NSA RA PA RA PA PA RA NSA NSA NSA “Children” agents

Basic Information Model Every Connection Instance has a set of “versions” associated with it Version numbers are integer values, 0 (zero) or greater The version number is optionally assigned by the RA in the Reserve.rq() – even for the initial reservation. Subsequent Reserve.rq version numbers may be specified by the RA in a monotonically increasing manner (they need not be sequential.) If the version is blank/missing/empty in the Reserve request, the PA will return an error.

Basic Information Model Upon receiving a syntactically valid Reservation request, a PA assigns a ConnectionID to the request, and constructs [internally] a “Primary Connection Information Block” (“PCIB”) associated with that ConnectionID The PCIB contains of an open ended chain (or list) of “Connection Version Blocks” (CVs) Each version block holds the constraints requested by the originating RA for that connection version. Each version block contains a chain (or list) of Connection Segment Blocks that define the children for that version The CSB elements represent the “RA”s for the children Children associated with different versions need not be the same

Data organization for “Local NSA” PCIB CID=“p1” Primary Connection Information Block – includes The Connection ID assigned by the local NSA Connection Versions Vers=(n) Orig RA info Vers=(m) Orig RA info Vers=(q) Orig RA info ... SegID#1,v(i) RA info PA info SegID#1,v(j) RA info PA info SegID#1,v(k) RA info PA info Children Segments SegID#2,v(i) RA info PA info SegID#4 RA info PA info SegID#4 RA info PA info SegID#3,v(i) RA info PA info SegID#5 RA info PA info SegID#5 RA info PA info SegID#3 RA info PA info SegID#3 RA info PA info ...

What can be modified In general and by protocol, any parameter of an existing Connection may be modified. Specific individual service implementations may restrict which parameters they will allow to be modified. The Service Definitions can indicate if a service attribute is “modifiable”. For example, the ETS service definition can indicate that only “end time’ and “capacity” can be modified.

Points and open issues... The PA must track the highest successfully reserved version, lowest active version, and current (active) version numbers for each connection On a Reserve Fail, only the reservation version that failed is canceled. A failed version number can be reused. (yes) A one-time use rule could easily be implemented, and would uniquely identify modify attempts for forensic purposes... Can we terminate (cancel) a particular version (?) Yes. If we can fail a reserve.rq by version#, we also require ability to terminate by version# to clean up other children. This is done with an “Abort()” primitive. Implemented as: terminate <*> or terminate <v#>

Points and open issues... Resource tracking must differentiate the versions I.e. if a resource becomes unavailable, the ConnectionID and version that is affected must be identifiable. Transitions (Commit.rq?) from one version to another is “hitless”... Hitless requirements cannot be more strict than the scope of acceptable error rates for a particular service.” (Identified in the Service Definition.) i.e. all circuits have an acceptable error rate. Hitless does *not* mean without detectable implications to the data flow... To quote LHCONE: “Hitless means we don’t want TCP sessions to fail due to a modification.” (Harvey Neuman) Using the LHCONE criteria – a modification could pose a significant albeit temporary hiccup in the data flow and still be acceptable.

Points and Other Issues... What happens if a reserve.rq is applied to an existing version (?) Should the specified version be interpretted the “current” connection to be modified and a new version# generated? Or is this to be interpretted to “please reserve the resources specified in this version” This is a semantic error that the RA specified version# is already in existance. The Reserve.rq is failed with appropriate error. A rollback could solve non-deterministic state issue. Use the “commit.rq <vers#>” to commit an earlier version. If we have the information...why could we not simply commit (re-configure) a prior v# No roll-back in NSI-CSv2.

Aging out versions Deleting historical version info locally does not mean that version is no longer in effect end-to-end. Retaining deprecated version info can be useful It is very cheap (the data is already present, simply hold it until the the entire Connection is cancel.) Can provide operational visibility for forensics An NSA MUST retain version details for all versions that have or will have active segments (These are “relevant” versions) An NSA MAY retain version details of historical (non-relevant) Connection versions

APAN Daejeong – NSI Tutorial

The Tutorial details (so far) Asia Pacific Advanced Networks organization Meeting at KISTI (?) August 19th We have been requested to do a reprise of the GLIF NSI Tutorial presented in Hawaii in January This was one day Oriented towards Network engineers (not applications developers per se) Hands on exercises Installing and configuring NSAs Constructing networks among switches

Help is needed This tutorial should reflect the latest NSI protocols: CSv2, DSv1, TS? ...