Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang,

Slides:



Advertisements
Similar presentations
Research Patterns Nick Feamster and Alex Gray CS 7001 September 26, 2007.
Advertisements

1/25 Generic and Automatic Address Configuration for Data Center Networks 1 Kai Chen, 2 Chuanxiong Guo, 2 Haitao Wu, 3 Jing Yuan, 4 Zhenqian Feng, 1 Yan.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Benchmarking traversal operations over graph databases Marek Ciglan 1, Alex Averbuch 2 and Ladialav Hluchý 1 1 Institute of Informatics, Slovak Academy.
Presentation of Designing Efficient Irregular Networks for Heterogeneous Systems-on-Chip by Christian Neeb and Norbert Wehn and Workload Driven Synthesis.
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tianyu Wo Capturing Topology in Graph Pattern Matching University of Edinburgh.
Native-Conflict-Aware Wire Perturbation for Double Patterning Technology Szu-Yu Chen, Yao-Wen Chang ICCAD 2010.
Research: Group communication in distributed interactive applications Student: Knut-Helge Vik Institute: University of Oslo, Simula Research Labs.
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric. Presented by: Vinuthna Nalluri Shiva Srivastava.
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
1 Efficient Subgraph Search over Large Uncertain Graphs Ye Yuan 1, Guoren Wang 1, Haixun Wang 2, Lei Chen 3 1. Northeastern University, China 2. Microsoft.
Cloud Service Placement via Subgraph matching
Software Engineering for Real- Time: A Roadmap H. Kopetz. Technische Universitat Wien, Austria Presented by Wing Kit Hor.
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Chuanxiong Guo, Haitao Wu, Kun Tan,
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
ANALYSIS OF GENETIC NETWORKS USING ATTRIBUTED GRAPH MATCHING.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
Optimality Study of Logic Synthesis for LUT-Based FPGAs Jason Cong and Kirill Minkovich VLSI CAD Lab Computer Science Department University of California,
Formal verification Marco A. Peña Universitat Politècnica de Catalunya.
Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo 2 nd ACM Symposium on Cloud ComputingOct 27, 2011 Small-World.
FAR: A Fault-avoidance Routing Method for Data Center Networks with Regular Topology Bin Liu, ZTE.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
CS492: Special Topics on Distributed Algorithms and Systems Fall 2008 Lab 3: Final Term Project.
1 Positioning Statement LinkRunner Network Multimeter An essential personal tool to quickly verify network connectivity and availability 1.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
Extreme-scale computing systems – High performance computing systems Current No. 1 supercomputer Tianhe-2 at petaflops Pushing toward exa-scale computing.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
On Graph Query Optimization in Large Networks Alice Leung ICS 624 4/14/2011.
1 Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids Cong Liu and Xiao Qin Auburn University.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
Topological Morphing of Planar Graphs Bertinoro Workshop on Graph Drawing 2012.
A Novel Local Patch Framework for Fixing Supervised Learning Models Yilei Wang 1, Bingzheng Wei 2, Jun Yan 2, Yang Hu 2, Zhi-Hong Deng 1, Zheng Chen 2.
Towards a Pattern Language for User Interface Design
KAIS T Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun and Ten H.Lai MobiHoc 2006.
Group 8: Denial Hess, Yun Zhang Project presentation.
Secure In-Network Aggregation for Wireless Sensor Networks
Axel Jantsch 1 Networks on Chip Axel Jantsch 1 Shashi Kumar 1, Juha-Pekka Soininen 2, Martti Forsell 2, Mikael Millberg 1, Johnny Öberg 1, Kari Tiensurjä.
Mining Top-K Large Structural Patterns in a Massive Network Feida Zhu 1, Qiang Qu 2, David Lo 1, Xifeng Yan 3, Jiawei Han 4, and Philip S. Yu 5 1 Singapore.
LogTree: A Framework for Generating System Events from Raw Textual Logs Liang Tang and Tao Li School of Computing and Information Sciences Florida International.
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems Jingwen Zhou 1, Zhenbang Chen 1, Ji Wang 1, Zibin Zheng 2, and Wei Dong.
Topic by Topic Performance of Information Retrieval Systems Walter Liggett National Institute of Standards and Technology TREC-7 (1999)
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Faster Symmetry Discovery using Sparsity of Symmetries Paul T. Darga Karem A. Sakallah Igor L. Markov The University of Michigan.
Graph Indexing From managing and mining graph data.
1 Double-Patterning Aware DSA Template Guided Cut Redistribution for Advanced 1-D Gridded Designs Zhi-Wen Lin and Yao-Wen Chang National Taiwan University.
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets) Cédric Favre(1,2), Hagen Völzer(1), Peter Müller(2)
Gspan: Graph-based Substructure Pattern Mining
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
An Algorithm for Enumerating SCCs in Web Graph Jie Han, Yong Yu, Guowei Liu, and Guirong Xue Speaker : Seo, Jong Hwa.
RuleTris: Minimizing Rule Update Latency for TCAM-based SDN Switches Xitao Wen*, Bo Yang #, Yan Chen*, Li Erran Li $, Kai Bu #, Peng Zheng &, Yang Yang*,
Experience Report: System Log Analysis for Anomaly Detection
Performance Evaluation of Adaptive MPI
Chuanxiong Guo, Haitao Wu, Kun Tan,
Bo Wang1, Yingfei Xiong2, Zhenjiang Hu3, Haiyan Zhao1,
On Efficient Graph Substructure Selection
Generic and Automatic Address Configuration for Data Center Networks
Generic and Automatic Address Configuration for Data Center Networks
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
View Inter-Prediction GAN: Unsupervised Representation Learning for 3D Shapes by Learning Global Shape Memories to Support Local View Predictions 1,2 1.
Presentation transcript:

Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang, Kai Zheng, Yan Chen, Xianda Sun Xi’an Jiaotong University Tsinghua University Northwestern University IBM China Research Lab ICDCS /25

Outline  Motivation  Research Problem Statement  Algorithm  Experiment  Conclusion 2

Background  Address Configuration for data center networks(DCN) is a problem  DHCP is not enough  Locality and topology information needs to be embedded in address  Address Configuration for DCN is challenging  Manual operation is error-prone  Data center scale is large  Supporting arbitrary topology is difficult 3

Background (cont.)  Review of a pioneering work: DAC  autoconfiguration for large scale DCN  error detection and correction  supporting arbitrary topology  DAC’s constraints  not totally automatic in face of malfunctions  manual correction efforts is involved  total time delay might be significant 4

Our Goal  Configure the well-functioning part DCN addresses automatically and fault-tolerantly first  the well-functioning part is the majority  the troublesome and time-consuming manual process is removed from the framework  the total configuration time of the well- functioning devices can be significantly reduced FrameworkError-toleranceManual Efforts DACNot consideredinvolved ETACconsideredNot involved 5

Outline  Motivation  Research Problem Statement  Algorithm  Experiment  Conclusion 6

Three graphs in the problem Blueprint:  A graph with logical IDs  Known in advance Physical Graph:  Real connections among the machines in the data center  collected using Physical topology Collection Protocol (PCP) Device Graph:  Device graph with error nodes removed 7

Framework of DAC and ETAC DAC:  Error detection  Manual correction Manually correct wiring!! 8

ETAC: Framework of DAC and ETAC Mapping from {1-6} to {A- H} key component of the proposed system!! 9

Subgraph Mapping  Formulate the mapping into the induced subgraph isomorphism problem Induced subgraph isomorphism problem is NP-complete!! 10

Outline  Motivation  Research Problem Statement  Algorithm  Experiment  Conclusion 11

Subgraph Mapping Algorithm  divide-and-conquer search  Two basic operation:  decompose  Refine (composed by splits) [1 2 3][4 5 6] [ABCD][EFGH] [2][1 3][4 5 6] [C][ABD][EFGH] [2][3][1][4][5 6] [C][D][AB][EF][GH] Decompose 2/C refine 2/C Split is done by connection relationship 12

Subgraph Mapping Algorithm  divide-and-conquer search  Two basic operation:  decompose  Refine (composed by splits) [1 2 3][4 5 6] [ABCD][EFGH] [2][1 3][4 5 6] [C][ABD][EFGH] [2][3][1][4][5 6] [C][D][AB][EF][GH] Decompose 2/C Refine 2/C Split is done by connection relationship 13

Algorithm Correctness  Two basic operation is not enough for correctness  We need judgment for correctness  Basic Idea of Such judgment (Theorem I):  For every step in the algorithm, if there are x new- emerging mapped pairs {v_i –> u_i}, these new mapping pairs should follow the mapping relation with all mapped pairs. (v_i, v’) = 1 if and only if (u_i, f(v’)) =1 v’ and f(v’) and mapped pairs in search 14

Algorithm Correctness - Example Before splitting: f(2) = C f(3) = D Check whether f(5) =G and f(6) = H is ok Check: (5,3) = 1 (f(5),f(3)) = (G,D) =1 (6,3) = 1 (f(6),f(3)) = (H,D) = 1 [2][3][1][4][5][6] [C][D][AB][EF][G][H] split by 5/G and 6/H [2][3][1][][4][5][6] [C][D][A][B][EF][G][H] 15

Algorithm Speed up  Two pruning Algorithms (details in paper)  Strategy Selection – The neighboring nodes to the currently mapped nodes are given higher priority for selection at decomposition Speed-up brought by  induced subgraph property  sparsity of data center topology  algorithm own features 16

Outline  Motivation  Research Problem Statement  Algorithm  Experiment  Conclusion 17

Experiment  Setting:  Various Structure: FatTree,VL2, BCube, Dcell  Different DCN size  Different Error Number  Different Error Pattern  Metric:  Time  Memory 18

Performance vs. scale Even if the DCN is in a scale of hundreds of thousands devices, it could accomplish the mapping within 5 minutes 19

Performance vs. error number Number of error does not matter much; average performance stable Bcube and Dcell’s performances have flucutation 20

Performance vs. error pattern  Switch-centric: different layer  Server-centric: different proportions of error switches 21

Outline  Motivation  Research Problem Statement  Algorithm  Experiment  Conclusion 22

Conclusion  ETAC: address autoconfiguration for well- functioning part of DCN without any human efforts in an efficient and fault-tolerant way  ETAC is a step towards more generic and automatic address configuration for DCN 23

Q & A Thanks! 24