Reading Exercise Policy Signaling, Programming Network Elements

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Ch. 31 Q and A CS332 Spring Network management more than just Ethernet Q: Comer mentions that network managers need to be able to account for different.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
10/8/2015CST Computer Networks1 IP Routing CST 415.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Network Management Security
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Introduction to Machine Learning, its potential usage in network area,
Network Concepts.
Chapter 19: Network Management
Instructor Materials Chapter 6: Quality of Service
Multi-layer software defined networking in GÉANT
Lec 5: SNMP Network Management
LMAP BoF 1. ISP use case 2. Framework
Instructor & Todd Lammle
Networking Devices.
Semester 4 - Chapter 3 – WAN Design
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Introduction to Networking
Interface to Routing System (I2RS)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 3 Part 3 Switching and Bridging
Reading Exercise (Routing) Policy-Mechanism Separation: PCE, ForCES
Computer Simulation of Networks
Scenarios, Niches, Architectures
Software Defined Networking (SDN)
CHAPTER 8 Network Management
Chapter 8: Monitoring the Network
ECEN “Internet Protocols and Modeling”
Setting Up Firewall using Netfilter and Iptables
Cloud computing mechanisms
Data Communication Networks
Switching Techniques.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
SNMP (Simple Network Management Protocol) based Network Management
Performance Evaluation of Computer Networks
Chapter 3 Part 3 Switching and Bridging
A Simple Sensing Program Structure
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Network Monitoring Charles Warren.
Performance Evaluation of Computer Networks
Congestion Control (from Chapter 05)
IoT, CPS, Smart-X – An Overview
In-network computation
Network Management Security
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Standards, Models and Language
Presentation transcript:

Reading Exercise Policy Signaling, Programming Network Elements Special Topic: Software Defined Networks Rudra Dutta Computer Science, NCSU

Policy, Management, Programming Policy – a reflection of arbitrary intent Typically arising from non-technology considerations Unlike settings/parameters (often optimizing efficiency or other operational considerations) Network management – process of enacting policy for network Through policy interface of box, if any Through settings interface of box (network-level policy) FCAPS “Programming” a network box Can only program capabilities box offers Programming the box versus programming the network Can program system (set network-level policy) by adjusting settings of components (coordinated configuration of box-level settings) Copyright Rudra Dutta, NCSU, Spring 2017

Network Management System Control Control Control Policy/Mgmt/Knowledge Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control Copyright Rudra Dutta, NCSU, Spring 2017

Network Management System A coordinated system of tools, and related interfaces, that allows network managers/engineers to monitor and administer/manage/control individual network elements, to meet predefined network-level goals Much of the operation of network control is (must be) automated – usual/common cases Much of the rest requires human oversight/intervention – centralized at NOC Copyright Rudra Dutta, NCSU, Spring 2017

Management Cycle and Design Reactive Protocol Design Algorithm Design Near Real-Time Resource Design Capacity Mgmt, Netw Engg. Network Planning Copyright Rudra Dutta, NCSU, Spring 2017

NMS Information Flow NMS acts as a complicated algorithm Input information Network status, health of elements and components “Live” information about traffic, flows, demands Other operational information Gathered by devices monitoring self and peers  control signaling Processing Detect/predict performance, policy, stability problems Decide on configuration changes if any Output information Any operational changes to be enacted Device configuration changes to enact them “Re-program” network Copyright Rudra Dutta, NCSU, Spring 2017

Input and Output “Language” Language, protocol, standardization Sometimes premature First need “communication objectives” “What can be said by NE to NMS?” “What are measurable quantities pertaining to NE?” Varies between NE  exercise becomes one of meta-language (how to speak) “What can be said to NE by NMS?” “What does NE do, and what can it change about what it does?” Variable, but commonalities on the most frequent capabilities  forwarding decision  routing policy Copyright Rudra Dutta, NCSU, Spring 2017

SNMP (RFCs 1156, 1157) Each managed device runs an SNMP agent that reports status to NMS Bidirectional allowed in standard, but less in practice A device/NE may have multiple managed components, each with agent AgMo MIB (treated as usual by SNMP) Agent is intentionally designed to be minimal Runs on UDP Information from agents largely solicited (polls) and some unsolicited (traps) Request, response, and trap PDUs Chaining of request and response PDUs allows small PDU size to be used for much larger logical requests/responses Copyright Rudra Dutta, NCSU, Spring 2017

MIB Copyright Rudra Dutta, NCSU, Spring 2017

Measurement and Monitoring Measurement can be seen as a generalization of status Can provide information of device scope, but also of larger scope, e.g. path bottleneck bandwidth Broadens further the variety of information that can be sent Techniques needed for actual measurement, but these are embedded in devices (“how”) Must be able to communicate  need agreement on “language” Copyright Rudra Dutta, NCSU, Spring 2017

netflow Proprietary, but originally accepted by community Copyright Rudra Dutta, NCSU, Spring 2017

IPFIX (RFCs 7011, 7012) Copyright Rudra Dutta, NCSU, Spring 2017

perfSONAR Copyright Rudra Dutta, NCSU, Spring 2017

NE Capabilities What does an NE do? Necessary precursor to: In turn: “What aspects of it can be controlled?” In turn: “What vocabulary is necessary in a language (signaling protocol) to exercise that control?” Reverse approach: design language for most common capabilities and control Insist NEs should not do any more Insist NEs should use default settings Allow (assume) NEs will exercise own judgement in configuring extra capabilities Design separate management system for extra capabilities Hierarchical approach Design meta-language to allow NE to declare capabilities Hand over to appropriate management module Copyright Rudra Dutta, NCSU, Spring 2017

Forwarding Foremost choice: forwarding decision (interface) Further choices: To forward or not (special case) Buffering class, priority Scheduling class, specifications for each level of scheduler Treat as data plane or control plane Some routers participate in OSPF and some do not OSPF packets may have to traverse both Copyright Rudra Dutta, NCSU, Spring 2017

Header Space Which header(s) does an NE base its decision/operation on? Possibly single layer – DLC Multiple layer “Isolated components” view Cross-layer view Payload ?! Deep packet inspection Borderline of what potentially could be standardized – “wild west” of management Copyright Rudra Dutta, NCSU, Spring 2017

Passive versus Active Header space choices with active operation Passive NE operation Capability: forward (or not) Monitor: observe traffic, measure or conclude value of some metric Active NE operation Monitor: inject “probe” or “test” traffic, control signals  observe results Capability: transform traffic, generate (replicate or otherwise) traffic Opens up NE to completely arbitrary behavior (and management requirement) Header space choices with active operation Copyright Rudra Dutta, NCSU, Spring 2017

SFC (RFCs 7498, 7665) Copyright Rudra Dutta, NCSU, Spring 2017