Usage cases for Congestion Accounting Bob Briscoe Chief Researcher, BT Oct 2009 This work is partly funded by Trilogy, a research project supported by.

Slides:



Advertisements
Similar presentations
End-host Perspectives on Congestion Management Murari Sridharan CONEX BOF, IETF 76, Hiroshima.
Advertisements

Using Self-interest to Prevent Malice Fixing the Denial of Service Flaw of the Internet Bob Briscoe Chief Researcher, BT Group Oct 2006 Credits: Martin.
Re-ECN: Adding Accountability for Causing Congestion to TCP/IP draft-briscoe-tsvwg-re-ecn-tcp-03 Bob Briscoe, BT & UCL Arnaud Jacquet, Alessandro Salvatori.
Internetworking II: MPLS, Security, and Traffic Engineering
Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-00 Bob Briscoe IETF-80 Mar 2011.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Xiphos.ca Charlie Younghusband XipLink Product Manager Xiphos Technologies Xiphos’ Work with SCPS-TP & applications and interest in CisLunar Introducing.
COM555: Mobile Technologies Location-Identifier Separation.
The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
A Poisoning-Resilient TCP Stack Amit Mondal Aleksandar Kuzmanovic Northwestern University
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
NET-REPLAY: A NEW NETWORK PRIMITIVE Ashok Anand Aditya Akella University of Wisconsin, Madison.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
1 Proposed Additional Use Cases for Congestion Exposure draft-mcdysan-conex-other-usecases-00.txt Dave McDysan.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Whither Congestion Control? Sally Floyd E2ERG, July
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
Viability of Congestion Exposure. Framing the Discussion This discussion is about congestion exposure – not any specific solution Viability and tractability.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
Quick-Start for TCP and IP A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICSI, April 2006 This and earlier presentations::
ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (ComCast) draft-moncaster-conex-concepts-uses-01.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Datagram Congestion Control Protocol
Internet resource sharing: a way forward? Bob Briscoe Chief Researcher, BT May 2009 This work is partly funded by Trilogy, a research project supported.
Controlling Internet Quality with Price Market Managed Multiservice Internet Bob Briscoe BT Research, Edge Lab, University College London & M3I Technical.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Congestion exposure BoF candidate protocol: re-ECN Bob Briscoe Chief Researcher, BT Nov 2009 This work is partly funded by Trilogy, a research project.
Solving this Internet resource sharing problem... and the next, and the next Bob Briscoe Chief Researcher BT Group (& UCL) Lou Burness, Toby Moncaster,
Interconnect QoS settlements & impairments Bob Briscoe BT Group CTO.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 19 – March 23, 2010.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Mr. Mark Welton.  Quality of Service is deployed to prevent data from saturating a link to the point that other data cannot gain access to it  QoS allows.
The Regulation of Network Industries Simon Wilkie. Caltech Lecture for May 7, 2004.
Network Performance Isolation in Data Centres using Congestion Policing draft-briscoe-conex-data-centre-01.txt draft-briscoe-conex-data-centre-01.txt Bob.
Users, Pricing and Resource Reservation: Managing Expectations. Jon Crowcroft,
ConEx Concepts and Abstract Mechanism draft-ietf-conex-abstract-mech-01.txt draft-ietf-conex-abstract-mech-01.txt Matt Mathis, Google Bob Briscoe, BT IETF-80.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Uni Innsbruck Informatik th IETF, PMTUD WG: Path MTU Discovery Using Options draft-welzl-pmtud-options-01.txt Michael Welzl
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
1 Three ways to (ab)use Multipath Congestion Control Costin Raiciu University Politehnica of Bucharest.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
COM594: Mobile Technologies Location-Identifier Separation.
Internet Networking recitation #9
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
PROTEAN: A Scalable Architecture for Active Networks
Queue Management Jennifer Rexford COS 461: Computer Networks
Bob Briscoe, BT Murari Sridharan, Microsoft IETF-84 ConEx Jul 2012
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
OmniRAN Introduction and Way Forward
Packet Sniffing.
* Essential Network Security Book Slides.
An Update on Multihoming in IPv6 Report on IETF Activity
COS 461: Computer Networks
Internet Networking recitation #10
OmniRAN Introduction and Way Forward
Presentation transcript:

Usage cases for Congestion Accounting Bob Briscoe Chief Researcher, BT Oct 2009 This work is partly funded by Trilogy, a research project supported by the European Community

2 pre-requisites need for congestion accounting overcoming ISP resistance prepare the market for contribution to congestion metric

3 ECN design for partial deployment quick tutorial if host ECN enabled, tries to use for all connections if not, ignores ECN part of incoming connection requests IP header tells network whether endpoints talk ECN congested forwarding element will drop packets if it’s ECN-enabled, marks ECN-enabled packets instead dangerous to mark not drop if receiver won’t understand TCP header negotiates ECN support when ECN client sends TCP SYN (initialisation packet) ECN on in TCP header, off in IP header if server supports ECN, SYN-ACK has ECN on in both other TCP-derived e2e transports are similar (DCCP/SCTP) UDP-based protocols (e.g. RTP/RTCP used in VoIP) ECN negotiation is undefined (standardisation just starting)

4 main steps to deploy re-feedback / re-ECN network turn on explicit congestion notification in data forwarding –already standardised in IP & MPLS –standards required for meshed network technologies at layer 2 (ECN in IP sufficient for point to point links) deploy simple active policing functions at customer interfaces around participating networks passive metering functions at inter-domain borders terminal devices (minor) addition to TCP/IP stack of sending device –or sender proxy in network receiver needs to be ECN-enabled at minimum –more precise with re-ECN receiver as well (minor addition) [in progress] redefinition of re-ECN with drop-only receiver requires update to the IP standard (v4 & v6) started process in Autumn 2005 using last available bit in IPv4 header or IPv6 extension header

5 deployment bootstrap incentives deployment effectively involves architectural change 1.(minor) change to sender’s Internet stack 2.network deploys edge/border incentive functions preventing gridlock between these actors requires strong incentives

6 deployment bootstrap incentives re-feedback solves central cost control problem of ISPs third party services competing with ISP pay below network cost ISP has to compete while paying balance of competitor’s costs hits very big fear and button and greed button but keeps moral high ground –net neutral and doesn’t help lock-in or lock-out alliance deployment strategy 3GPP alliance has most to lose from not deploying, followed by NGNs controls vertically integrated network and mobile terminal market deployment by cross-infection nomadic, roaming devices inverse bundling can degrade a substitute product (legacy network service without re-feedback) generally useful model for security products – tend to restrict rather than enhance

7 unilateral actions OS & application developers LEDBAT & weighted congestion controls incentive: prioritise interactive against self-congestion incentive to distinguish self-congestion from shared ECN-enabled client disincentive: small risk of delay or home gateway crash ECN-enabled server incentive-neutral (widely happening now) re-ECN-enabled sender (with drop-only receiver) [TBA – may not be a feasible option] incentive: majority light users declare this to network disincentive: risk of delay due to re-ECN black holes re-ECN-enabled sender (with ECN or re-ECN receiver) incentive: majority light users declare this to network

8 unilateral actions network providers Volume over fine-grained durations (proxy for congestion) incentive: improve majority experience Monitor congestion in network elements and report to traffic management system disincentive: proprietary (why not just ask for ECN?) Artificially Centralise Bottleneck and monitor its Congestion Losses incentive: may match existing topology disincentive: may not – would require excess capacity deploy ECN disincentive: OSS costs incentive Sub-network ECN disincentive: complex Re-ECN proxy disincentive: complex contract modifications open description of internal traffic treatment handling of ECN

Usage cases for Congestion Accounting discuss... spare slides on DDoS as a motivating case

10 will re-feedback prevent DDoS? ≡ will it be deployed widely enough? deployment bootstrap incentives deployment closure incentives doesn’t have to finish the job itself can create right incentives to deploy complementary solutions once fully deployed, winning the war distinguishing genuine flash crowd from simultaneous attack deployment

11 deployment bootstrap incentives deployment effectively involves architectural change 1.(minor) change to sender’s Internet stack 2.network deploys edge/border incentive functions preventing gridlock between these actors requires strong incentives deployment

12 deployment deployment bootstrap incentives  bundling with itself re-feedback solves central cost control problem of ISPs –third party services competing with ISP pay below network cost –ISP has to compete while paying balance of competitor’s costs hits very big fear and button and greed button but keeps moral high ground –net neutral and doesn’t help lock-in or lock-out re-f/b as a solution to DDoS bundled with re-f/b as cost-control alliance deployment strategy 3GPP alliance has most to lose from not deploying, followed by NGNs controls vertically integrated network and mobile terminal market  deployment by cross-infection nomadic, roaming devices  inverse bundling can degrade a substitute product (legacy network service without re-feedback) generally useful model for security products – tend to restrict rather than enhance  novel deployment models wrt Ozment & Schechter

13 deployment deployment closure incentives assume 1 st mover (cellular industry?) has deployed 2 nd movers (NGNs?) didn’t because benefit lower than cost (if rational) but first mover removed costs (risks of unknown, R&D recovered) early adopters also change operational finances for non-adopters... money valve effect between adopters and non-adopters re-feedback controls congestion costs for adopters peaks in incoming traffic demand drive money inward outgoing traffic peaks only generate averaged money flow –costs of non-adopters depend on peak not average stronger effect, the more variance in demand DDoS is extreme variance in demand like alternating current through a diode/valve chain reaction adopters’ incoming border charges focus on non-adopters bots concentrate into smaller non-adopter space money valve effect surrounds more of non-adopters’ borders $ £ ¥ €

14 deployment winning the last battle (not just the next) distinguishing flash crowds from attacks incentives not to be too greedy a rate policer is effectively a revenue limiter if policer allows DDoS attacks, customer has to buy bigger quota why would operators try to distinguish the two? customers will switch to responsible operators distinguishing true demand form zombies is in operator’s interest fortunately society still civilised enough huge white market revenue not worth risking –just to capture marginal gains from black market strategic greed overcomes myopic greed