REDUNDANCY ELIMINATION AS A NETWORK-WIDE SERVICE Aditya Akella UW-Madison Shuchi Chawla Ashok Anand Chitra Muthukrishnan UW-Madison Srinivasan Seshan Vyas.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
A Search Memory Substrate for High Throughput and Low Power Packet Processing Sangyeun Cho, Michel Hanna and Rami Melhem Dept. of Computer Science University.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
UltraBand Content Delivery Platform
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
Secure Content Delivery in Information-Centric Networks: Design, Implementation, and Analyses Computer Science Department New Mexico State University,
SmartRE: An Architecture for Coordinated Network-Wide Redundancy Elimination Ashok Anand, Vyas Sekar, Aditya Akella University of Wisconsin, Madison Carnegie.
Traffic Shaping Why traffic shaping? Isochronous shaping
NLIT 09 Presentation Page 1 Vision – Service – Partnership Page 1 WAN Acceleration Using Cisco WAAS Robert Morrow National Security Technologies LLC
Detecting DDoS Attacks on ISP Networks Ashwin Bharambe Carnegie Mellon University Joint work with: Aditya Akella, Mike Reiter and Srinivasan Seshan.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers Piotr Srebrny, Thomas Plagemann, Vera Goebel Department.
REDUNDANCY IN NETWORK TRAFFIC: FINDINGS AND IMPLICATIONS Ashok Anand Ramachandran Ramjee Chitra Muthukrishnan Microsoft Research Lab, India Aditya Akella.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination Ashok Anand, Archit Gupta, Aditya Akella University of Wisconsin,
Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination Ashok Anand, Archit Gupta, Aditya Akella University of Wisconsin,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Router Architecture : Building high-performance routers Ian Pratt
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
Traffic Engineering With Traditional IP Routing Protocols
Jang, Donghyun 2011/4/4 1/21.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
A Scalable, Commodity Data Center Network Architecture.
1 Minimization of Network Power Consumption with Redundancy Elimination T. Khoa Phan* Joint work with: Frédéric Giroire*, Joanna Moulierac* and Frédéric.
WAN Technologies.
NET-REPLAY: A NEW NETWORK PRIMITIVE Ashok Anand Aditya Akella University of Wisconsin, Madison.
Introduction Course Overview Students Industrial Work Experience Scheme (SIWES) Agboko B.A.
P2P Games Conference “Attributes of the Gaming Cloud?” Norman Henderson ASANKYA
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
Distributing Content Simplifies ISP Traffic Engineering Abhigyan Sharma* Arun Venkataramani* Ramesh Sitaraman*~ *University of Massachusetts Amherst ~Akamai.
Redundancy elimination as a network service Aditya Akella UW-Madison.
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical.
ECE 526 – Network Processing Systems Design Network Processor Architecture and Scalability Chapter 13,14: D. E. Comer.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.
COST REDUCTION MECHANISM IN CLOUD USING PACK COST REDUCTION MECHANISM IN CLOUD USING PACK GUIDE PROJECT BY Dr. J.JAGADEESAN AVAYAMBIGAI.J SANTHI.K.S PARIMALA.S.
HAIR: Hierarchical Architecture for Internet Routing Anja Feldmann TU-Berlin / Deutsche Telekom Laboratories Randy Bush, Luca Cittadini, Olaf Maennel,
LAN Switching and Wireless – Chapter 1
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
EndRE: An End-System Redundancy Elimination Service Bhavish Aggarwal, Aditya Akella, Ashok Anand, Athula Balachandran, Pushkar Chitnis, Chitra Muthukrishnan,
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
SDX: A Software-Defined Internet eXchange Jennifer Rexford Princeton University
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Piotr Srebrny 1.  Problem statement  Packet caching  Thesis claims  Contributions  Related works  Critical review of claims  Conclusions  Future.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
DECOR: A Distributed Coordinated Resource Monitoring System Shan-Hsiang Shen Aditya Akella.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
NT1210 Introduction to Networking
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
Multicast in Information-Centric Networking March 2012.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
EA C451 Vishal Gupta.
Addressing: Router Design
RWTH Aachen University, Germany
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Presentation transcript:

REDUNDANCY ELIMINATION AS A NETWORK-WIDE SERVICE Aditya Akella UW-Madison Shuchi Chawla Ashok Anand Chitra Muthukrishnan UW-Madison Srinivasan Seshan Vyas Sekar CMU Ram Ramjee MSR-India Scott Shenker UC-Berkeley

Growing traffic vs. network performance 2  Network traffic volumes growing rapidly  Annual growth: overall (45%), enterprise (50%), mobile (125%)*  Growing strain on installed capacity everywhere  Core (Asian ISPs – 80-90% core utilization), enterprise access, data center, cellular, wireless…  How to sustain robust network performance? * Interview with Cisco CEO, Aug 2007, Network world Enterprises Mobile users Home users Video Data centers Web content Other svcs (backup) ISP core Strain on installed link capacities

Enterprises Scale link capacities by suppressing duplicates 3  A key idea: suppress duplicates  Popular objects, partial content matches, backups, app headers  Effective capacity improves ~ 2X  Many approaches  Application-layer caches  Protocol-independent schemes Below app-layer WAN accelerators, de-duplication  Content distribution CDNs like Akamai, CORAL Bittorrent  Point solutions  apply to specific link, protocol, or app Mobile users Home users Video Data centers Web content Other svcs (backup) Wan Opt Dedup/ archival ISP HTTP cache ISP HTTP cache CDN

Universal need to scale capacities 4 Wan Opt Dedup/ archival ISP HTTP cache ISP HTTP cache Point solutions inadequate Architectural support to address universal need to scale capacities? Implications? Bittorrent ✗ Point solutions: Little or no benefit in the core ✗ Point solutions: Little or no benefit in the core ✗ Point solutions: Other links must re-implement specific RE mechanisms ✗ Point solutions: Other links must re-implement specific RE mechanisms ✗ Point solutions: Only benefit system/app attached

How? Ideas from WAN optimization 5 5 Cache WAN link Data center Enterprise  Network must examine byte streams, remove duplicates, reinsert  Building blocks from WAN optimizers: RE agnostic to application, ports or flow semantics  Upstream cache = content table + fingerprint index  Fingerprint index: content-based names for chunks of bytes in payload  Fingerprints computed for content, looked up to identify redundant byte- strings  Downstream cache: content table

Internet2 Packet cache at every router From WAN acceleration to router packet caches 6 Wisconsin Berkeley CMU Router upstream removes redundant bytes Router downstream reconstructs full packet Router upstream removes redundant bytes Router downstream reconstructs full packet (Hop-by-hop works for slow links Alternate approaches to scale to faster links…) (Hop-by-hop works for slow links Alternate approaches to scale to faster links…)

Implications overview: Performance and architectural benefits 7  Improved performance everywhere even if partially enabled  Generalizes point deployments and app-specific approaches Benefits all network end-points, applications  Crucially, benefits ISPs Improved switching capacity, responsiveness to sudden overload  Architectural benefits  Enables new protocols and apps Min-entropy routing, RE-aware traffic engineering (intra- and inter-domain) Anomaly detection, in-network filtering of unwanted traffic  Simplifies/improves apps: need not worry about using network efficiently Application control messages & headers can be verbose  better diagnostics Controlling duplicate transmission in app-layer multicast is a non-issue

Internet2 Implications example: Performance benefits 8 Network RE  12 pkts (ignoring tiny packets) Network RE  12 pkts (ignoring tiny packets) Without RE  18 pkts 33% lower Without RE  18 pkts 33% lower Wisconsin Berkeley CMU Generalizes point deployments Benefits ISPs: improve effective switching capacity 6  2 packets 3  2 packets

Wisconsin Internet2 Implications example: New protocols 9 RE + routing  10 pkts RE + routing  10 pkts Simple RE  12 pkts Berkeley CMU 9 ✓ Redundancy-based anomaly detectors ✓ Network-assisted spam filtering ✓ New content distribution mechanisms ✓ Redundancy-based anomaly detectors ✓ Network-assisted spam filtering ✓ New content distribution mechanisms ✓ Minimum-entropy routing ✓ New, flexible traffic engineering mechanisms ✓ Inter-domain protocols ✓ Minimum-entropy routing ✓ New, flexible traffic engineering mechanisms ✓ Inter-domain protocols

Network RE service: Quantitative results 10  Analysis of 12 enterprises: traffic 15-60% redundant [SIGMETRICS 09]  ~1GB of cache sufficient to identify redundancies  DRAM or PCM (PRAM) on routers  Network RE benefits both ISPs and end-networks [SIGCOMM 08]  Upto 15-50% better util, responsive TE, control inter-domain traffic impact  Centralized algorithm for min-entropy routing (using “redundancy profiles”) Reduces utilization by a further 10-25% in intra-domain case Inter-domain min-entropy routing: gains much more significant (50-80%)  Is network RE viable at high speeds? Not in its current form…  Compression is slow: limits hop-by-hop speed at each hop to 2.5Gbps Acceptable for access, wireless, cellular links, not for the core Also, wastes memory on multiple routers  limits effectiveness

SmartRE: Concerted network-wide RE 11  Toss out link-by-link view; treat RE as a network-wide problem per ISP [Current work]  Memory usage: each packet compressed/un-compressed once  Throughput: allow reconstruction multiple hops away from compression  Stand-alone reconstruction much faster when freed from dependence on compression immediately upstream  Reconstructor can reconstruct a lot more, from multiple different compression agents  Resource-awareness: carefully account for network and device resources, and traffic  Compression/reconstruction/caching locations decided based on memory capacity and memory operations  Also consider global TE objectives  Just 4% from ideal RE (no memory or processing constraints)

Summary and future directions 12  RE service to scale link capacities everywhere  Architectural niceties and performance benefits  High speed router RE seems feasible  Future directions  End-host participation  Role of different memory technologies – DRAM, flash and PCM  Theoretical issues – pricing and economics, routing policy, network design  Network coding as an alternative to compression