Network Performance Management S. Keshav C/NRG (with Rosen Sharma, Andy Choi, Wilson Huang, Lili Qiu, Russell Schwager, Rachit Siamwalla, Jia Wang, and.

Slides:



Advertisements
Similar presentations
Categories of I/O Devices
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
Operating System.
Network Performance Measurement
Technical Architectures
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Network Monitoring Russell Schwager February 18, 1998
Wireless LAN Topology Visualiser Project Supervisor: Dr Arkady Zaslavsky Project Team Members: Jignesh Rambhia Robert Mark Bram Tejas Magia.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
OPERATING SYSTEMS Introduction
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
11 SERVER CLUSTERING Chapter 6. Chapter 6: SERVER CLUSTERING2 OVERVIEW  List the types of server clusters.  Determine which type of cluster to use for.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Client/Server Architectures
31 January 2007Craig E. Ward1 Large-Scale Simulation Experimentation and Analysis Database Programming Using Java.
Chapter 3 Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Project Octopus: Network Topology Discovery Rachit Siamwalla Rosen Sharma MONET : Cornell Department of Computer Science.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
Operating System. Architecture of Computer System Hardware Operating System (OS) Programming Language (e.g. PASCAL) Application Programs (e.g. WORD, EXCEL)
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
COMP 410 & Sky.NET May 2 nd, What is COMP 410? Forming an independent company The customer The planning Learning teamwork.
Performance Concepts Mark A. Magumba. Introduction Research done on 1058 correspondents in 2006 found that 75% OF them would not return to a website that.
CHAPTER FOUR COMPUTER SOFTWARE.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Module 4: Fundamentals of Communication Technologies.
The Linux /proc Filesystem CSE8343 – Fall 2001 Group A1 – Alex MacFarlane, Garrick Williamson, Brad Crabtree.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Salim Hariri HPDC Laboratory Enhanced General Switch Management Protocol Salim Hariri Department of Electrical and Computer.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Large-scale Virtualization in the Emulab Network Testbed Mike Hibler, Robert Ricci, Leigh Stoller Jonathon Duerig Shashi Guruprasad, Tim Stack, Kirk Webb,
Producing a high-impact web experience by integrate Macromedia Flash and ASP By Katie Tuttle CS 330: Internet Architecture and Programming Project.
1 Root-Cause VoIP Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
Network Troubleshooting
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
ECHO A System Monitoring and Management Tool Yitao Duan and Dawey Huang.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
FILE SYSTEM IMPLEMENTATION 1. 2 File-System Structure File structure Logical storage unit Collection of related information File system resides on secondary.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
 SITI NUR SOLEHA BT ADAM  SYAFIQAH YUSRA BT MOHAMAD  HUMAIRA BT KHAIRUDDIN  INTAN NORAZLINA BT HAIRUDDIN 
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO PathSolutions.
Operating System.
Chapter 6 Network Performance Measurement
QNX Technology Overview
Russell Schwager May 6, 1998 Network Monitoring Russell Schwager May 6, 1998
Software models - Software Architecture Design Patterns
Chapter 2: Operating-System Structures
Chapter 15: Network Monitoring and Tuning
Chapter 2: Operating-System Structures
Features Overview.
Presentation transcript:

Network Performance Management S. Keshav C/NRG (with Rosen Sharma, Andy Choi, Wilson Huang, Lili Qiu, Russell Schwager, Rachit Siamwalla, Jia Wang, and Yin Zhang)

Motivation p Networks are increasing in breadth…. –greater density of connections –PCs come with built-in networking –ADSL and cable modems –wireless networking p as well as in depth –variety of qualities, policies, and media

The current situation p Loss of productivity from –slow file access –web site disconnection –slow access to a web site –no one knows exactly why! p Greater breadth and depth => even more dependency on the network => even more problems

Is QoS enough? p Lots of research in the area of QoS –RSVP, differential service etc. provide a good overall user experience, one stream at a time –Is QoS all there is to a good user experience? p An incorrect reservation  poor service for one stream p A misconfigured router  complete loss of service to one or more ports!

Aha! p User experience is affected more by ‘mundane’ network management than by ‘exotic’ QoS research p This motivates our entire research effort

Why networks fail p Link or router failure p Transient overload p Unanticipated increase in load p Misconfiguration Increasingly harder to detect

Need Better Network Management p Current approaches –GUI-centric –lots of flashing lights, but no intelligence p Can detect failures but... –ad hoc capacity planning –ad hoc configuration no way of testing other than “just try it!” p Can’t manage network performance

Performance management Topology discovery Fix problems (AI and simulation) Collect statistics (monitoring) Identify problems (display and simulation) Configure new hardware (simulation)

Discovery: Project Octopus Permanent Set Temporary Set Heuristic

Techniques p DNS-ls p SNMP p Random probe p Traceroute p Directed broadcast ping

Results p Have automatically discovered entire CS department topology p As well as entire Stanford topology (> 220 subnets) p Cornell topology is being discovered as we speak! –info being shared with CIT

Monitoring p A PERL script uses SNMP and queries a router using various MIB entries. p The MIB entries are stored in an input file. p The values gathered from the router are stored in a file. p The script works on both UNIX and WinNT.

Monitoring (contd.) p Other PERL scripts parse the data and convert it to other formats. p Currently supported formats: –HTML - The data is presented in a table format in HTML. –GNUPlot graphs - The data can be graphed or saved in pbm format

A Case Study: CSGate2 p From 2/19/98 to 2/23/98, the router CSGate2 was probed every 5 minutes recording various statistics on the data coming into and going out of the router. Incoming bytes at CSgate2

Display goals p We want to display multiple views p Views should be dynamic p Shoul allow expansion and contraction p Rapid creation of user interface p Reusability of GUI components

Solution: Script Java p Component-based system p Reusable manageable components p Can build large manageable applications p Sharing over the web p Record and playback

Architecture p Use JavaScript/Visual Basic as the scripting language p Use Java to write components p Create a adapter hierarchy for the current AWT components

Script Java Objects p HTML pages p Java structures intelligence p protection by namespace Data Model p linearized data structures p java  perl  javascript Communication Abstraction p multicast channels

Advantages p Allows us to glue components using a scripting language, allowing rapid prototyping and development p New components can be easily integrated p For large applications, a lot of the complexity and chaos can be taken out of scripting

Advantages(cont.) p JavaScript can be streamed from the server, allowing for presentations and sharing p Dynamic Html –layers are windows –these windows render html

Storage goals p We need to store topology and monitoring results somewhere p Database: too structured and too much overhead p File system: not enough semantics p Idea: treat URL as a file system link and HTML tags as associated semantics

WebFS p HTML tags allow arbitrary semantic abstractions p Manipulate these abstractions to present a virtualized file system p grep -headings *.html p sed ‘/ /jdbc(“tags.db”, “foo”)/’

The magic bullet: simulation p Realistic simulation where networking subsystem interacts with other parts of kernel p Fast simulation for large networks ( > 1000 hosts) p Hide the abstraction of simulated network, same API as system calls

FreeBSD kernel  User Space Kernel core Telnetd ping gated machine Kernel wrapper msg Network Stack Telnetd ping gated Sockets traps 

Simulated machine p Task based approach – a trap sends a message to kernel – an upper call is a message from kernel p All components of simulated machine live on same process Kernel core Telnetd ping gated machine Kernel wrapper msg Simulated link

More on simulated machine p Capture network related system calls, file descriptor auto re-mapping. p Virtual file system root p Single-thread kernel, therefore no need for locking

Simulated network Kernel core Telnetd ping gated machine msg

Integrating with real network p Use U-Net to interact with external device p Router has the illusion of being in a physical network p Test equipment before actual deployment Physical Router Unet

Tradeoffs p Balance between realism and speed –Using FreeBSD as basis for realistic simulation –Using session level simulation to speed up p Ease of porting applications

Open issues p Fault identification –Bayesian networks? –Ensemble of experts? –Other AI approaches? p How to do session-level simulation? p Configuring real systems –IP9000