Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, and Y. Richard Yang Laboratory of Networked Systems Yale University February.

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Software-defined networking: Change is hard Ratul Mahajan with Chi-Yao Hong, Rohan Gandhi, Xin Jin, Harry Liu, Vijay Gill, Srikanth Kandula, Mohan Nanduri,
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
1 Aman Shaikh UCSC SHS IMW A Case-study of OSPF Behavior in a Large Enterprise Network Aman Shaikh, UCSC Chris Isett, Siemens Health Services Albert.
Virtually Eliminating Router Bugs Minlan Yu Princeton University Joint work with Eric Keller (Princeton), Matt Caesar (UIUC),
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
OpenFlow-Based Server Load Balancing GoneWild
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Scalable Flow-Based Networking with DIFANE 1 Minlan Yu Princeton University Joint work with Mike Freedman, Jennifer Rexford and Jia Wang.
VROOM: Virtual ROuters On the Move Jennifer Rexford Joint work with Yi Wang, Eric Keller, Brian Biskeborn, and Kobus van der Merwe
1 © 2003, Cisco Systems, Inc. All rights reserved. Computer Networks 6 Layer 3 troubleshooting Halmstad University Olga Torstensson
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
1 Design and implementation of a Routing Control Platform Matthew Caesar, Donald Caldwell, Nick Feamster, Jennifer Rexford, Aman Shaikh, Jacobus van der.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
RD-CSY /09 Distance Vector Routing Protocols.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Routing and Routing Protocols
CS335 Networking & Network Administration Tuesday, April 20, 2010.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Tesseract A 4D Network Control Plane
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
1 Network-wide Decision Making: Toward a Wafer-thin Control Plane Jennifer Rexford, Albert Greenberg, Gisli Hjalmtysson ATT Labs Research David A. Maltz,
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
1 Latency Equalization: A Programmable Routing Service Primitive Minlan Yu Joint work with Marina Thottan, Li Li at Bell Labs.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
MPLS Evan Roggenkamp. Introduction Multiprotocol Label Switching High-performance Found in telecommunications networks Directs data from one network node.
1 Performance Evaluation of Ring- based Peer-to-Peer Virtual Private Network (RING-P2P-VPN) Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
Virtual ROuters On the Move (VROOM): Live Router Migration as a Network-Management Primitive Yi Wang, Eric Keller, Brian Biskeborn, Kobus van der Merwe,
CSE Senior Design II Overview: Software System Architecture Software System Test Mike O’Dell Based on an earlier presentation by Bill Farrior, UTA, modified.
Approximate Load Balance Based on ID/Locator Split Routing Architecture 1 Sanqi Zhou, Jia Chen, Hongbin Luo, Hongke Zhang Beijing JiaoTong University
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Central Control over Distributed Routing fibbing.net SIGCOMM Stefano Vissicchio 18th August 2015 UCLouvain Joint work with O. Tilmans (UCLouvain), L. Vanbever.
A Measurement Based Memory Performance Evaluation of High Throughput Servers Garba Isa Yau Department of Computer Engineering King Fahd University of Petroleum.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 Rethinking Network Control and Management David A. Maltz
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Simulation of the OLSRv2 Protocol First Report Presentation.
OSPF Offloading: The HELLO Protocol A First Step Toward Distributed Heterogeneous Offloading Speaker: Mary Bond.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Cisco Systems Networking Academy S2 C 12 Routing Protocols.
Routing and Routing Protocols PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Routing Protocols Brandon Wagner.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
Implementing Cisco IP Routing (ROUTE v2.0)
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Richard Alimi Thesis Defense September 29, 2010
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
SDN challenges Deployment challenges
Problem: Internet diagnostics and forensics
Shadow Configurations: A Network Management Primitive
Planning and Troubleshooting Routing and Switching
H.264/SVC Video Transmission Over P2P Networks
Implementing a Scalable Multiarea Network OSPF-Based Solution
COS 561: Advanced Computer Networks
Collection Tree Protocol
Presentation transcript:

Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, and Y. Richard Yang Laboratory of Networked Systems Yale University February 16, 2009

Yale University2 Configuration Leads to Errors Source: The Yankee Group, 2004 Source: Juniper Networks, 2008 “... human error is blamed for 50-80% of network outages.” “80% of IT budgets is used to maintain the status quo.” Why is configuration hard today?

February 16, 2009Yale University3 Configuration Management Today Simulation & Analysis  Depend on simplified models Network structure Hardware and software  Limited scalability  Hard to access real traffic Test networks  Can be prohibitively expensive OSPF eBGP VPNs ACLs TE SLAsiBGPTraffic Software Hardware Why are these not enough?

February 16, 2009Yale University4 Analogy with Programming Programming Network Management Program Target System Configs Target Network

February 16, 2009Yale University5 Analogy with Databases Databases Network Management INSERT... DELETE... UPDATE... INSERT... DELETE... UPDATE... STATE A STATE B ip route... ip addr... STATE A ? router bgp... STATE B STATE C router ospf... STATE D

February 16, 2009Yale University6 Enter, Shadow Configurations OSPF eBGP VPNs ACLs TE SLAsiBGPTraffic Software Hardware Key Benefits  Realistic (no model)  Scalable  Access to real traffic  Transactional Key ideas  Allow additional (shadow) config on each router  In-network, interactive shadow environment  “Shadow” term from computer graphics

February 16, 2009Yale University7 Roadmap Motivation and Overview System Basics and Usage System Components  Design and Architecture  Performance Testing  Transaction Support Implementation and Evaluation

February 16, 2009Yale University8 What's in the shadow configuration?  Routing parameters  ACLs  Interface parameters  VPNs  QoS parameters Shadow config Real config Shadow header marked “1” Real header marked “0” System Basics

February 16, 2009Yale University9 Example Usage Scenario: Backup Path Verification Primary Backup

February 16, 2009Yale University10 Example Usage Scenario: Backup Path Verification Send test packets in shadow

February 16, 2009Yale University11 Example Usage Scenario: Backup Path Verification Disable shadow link XX

February 16, 2009Yale University12 Example Usage Scenario: Backup Path Verification

February 16, 2009Yale University13 Example Usage Scenario: Configuration Evaluation Video Server

February 16, 2009Yale University14 Example Usage Scenario: Configuration Evaluation Video Server

February 16, 2009Yale University15 Example Usage Scenario: Configuration Evaluation Video Server Duplicate packets to shadow

February 16, 2009Yale University16 Roadmap Motivation and Overview System Basics and Usage System Components  Design and Architecture  Performance Testing  Transaction Support Implementation and Evaluation

February 16, 2009Yale University17 Design and Architecture Management Control Plane Forwarding Engine Configuration UI BGP OSPF IS-IS Interface 0 Interface 1 Interface 2 Interface 3 FIB

February 16, 2009Yale University18 Design and Architecture Management Control Plane Forwarding Engine Configuration UI BGP OSPF IS-IS Shadow-enabled FIB Shadow Bandwidth Control Interface 0 Interface 1 Interface 2 Interface 3

February 16, 2009Yale University19 Design and Architecture Management Control Plane Forwarding Engine Configuration UI Shadow Management Commitment BGP OSPF IS-IS Shadow-enabled FIB Shadow Bandwidth Control Interface 0 Interface 1 Interface 2 Interface 3

February 16, 2009Yale University20 Design and Architecture Management Control Plane Forwarding Engine Configuration UI Shadow Traffic Control FIB Analysis Debugging Tools Shadow Management Commitment BGP OSPF IS-IS Shadow-enabled FIB Shadow Bandwidth Control Interface 0 Interface 1 Interface 2 Interface 3

February 16, 2009Yale University21 Design and Architecture Management Control Plane Forwarding Engine Configuration UI Shadow Traffic Control FIB Analysis Debugging Tools Shadow Management Commitment BGP OSPF IS-IS Shadow-enabled FIB Shadow Bandwidth Control Interface 0 Interface 1 Interface 2 Interface 3

February 16, 2009Yale University22 Shadow Bandwidth Control Requirements  Minimal impact on real traffic  Accurate performance measurements of shadow configuration Supported Modes  Priority  Bandwidth Partitioning  Packet Cancellation

February 16, 2009Yale University23 Observation: in many network performance testing scenarios,  Content of payload is not important  Only payload size matters Idea: only need headers for shadow traffic Piggyback shadow headers on real packets Piggybacked shadow header Packet Cancellation

February 16, 2009Yale University24 Packet Cancellation Details Output interface maintains real and shadow queues  Q r and Q s

February 16, 2009Yale University25 Packet Cancellation Details Output interface maintains real and shadow queues  Q r and Q s

February 16, 2009Yale University26 Packet Cancellation Details Output interface maintains real and shadow queues  Q r and Q s

February 16, 2009Yale University27 Packet Cancellation Details Output interface maintains real and shadow queues  Q r and Q s

February 16, 2009Yale University28 Forwarding Overhead IP Looku p Without Packet Cancellation: IP Looku p With Packet Cancellation: Cancellation may require routers to process more packets. Can routers support it?

February 16, 2009Yale University29 Routers can be designed for worst-case  L : Link speed  K min : Minimum packet size  Router supports packets per second Load typically measured by link utilization  α r : Utilization due to real traffic (packet sizes k r )  α s : Utilization due to shadow traffic (packet sizes k s ) We require: Forwarding Overhead Analysis

February 16, 2009Yale University30 Routers can be designed for worst-case  L : Link speed  K min : Minimum packet size  Router supports packets per second Load typically measured by link utilization  α r : Utilization due to real traffic (packet sizes k r )  α s : Utilization due to shadow traffic (packet sizes k s ) We require: Forwarding Overhead Analysis Example: With α = 70%, and 80% real traffic utilization Support up to 75% shadow traffic utilization

February 16, 2009Yale University31 Commitment Objectives  Smoothly swap real and shadow across network Eliminate effects of reconvergence due to config changes  Easy to swap back

February 16, 2009Yale University32 Commitment Objectives  Smoothly swap real and shadow across network Eliminate effects of reconvergence due to config changes  Easy to swap back Issue  Packet marked with shadow bit 0 = Real, 1 = Shadow  Shadow bit determines which FIB to use  Routers swap FIBs asynchronously  Inconsistent FIBs applied on the path

February 16, 2009Yale University33 Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases

February 16, 2009Yale University34 Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases  Distribute tags for each config C-old for current real config C-new for current shadow config : C-old 1: C-new

February 16, 2009Yale University35 Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases  Distribute tags for each config C-old for current real config C-new for current shadow config  Routers mark packets with tags Packets forwarded according to tags C-old C-new C-old C-new C-old C-new

February 16, 2009Yale University36 C-old C-new C-old C-new 0: C-new 1: C-old C-new C-old Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases  Distribute tags for each config C-old for current real config C-new for current shadow config  Routers mark packets with tags Packets forwarded according to tags  Swap configs (tags still valid)

February 16, 2009Yale University37 Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases  Distribute tags for each config C-old for current real config C-new for current shadow config  Routers mark packets with tags Packets forwarded according to tags  Swap configs (tags still valid)  Remove tags from packets Resume use of shadow bit

February 16, 2009Yale University38 Commitment Protocol Idea: Use tags to achieve consistency  Temporary identifiers Basic algorithm has 4 phases  Distribute tags for each config C-old for current real config C-new for current shadow config  Routers mark packets with tags Packets forwarded according to tags  Swap configs (tags still valid)  Remove tags from packets Resume use of shadow bit

February 16, 2009Yale University39 Transient States Definition: State in which some packets use C-old and others use C-new. C-old C-new Transient State

February 16, 2009Yale University40 Transient States Definition: State in which some packets use C-old and others use C-new. C-old C-new C-old

February 16, 2009Yale University41 Transient States Definition: State in which some packets use C-old and others use C-new. Possible overutilization! Should be short-lived, even with errors C-old C-new C-old

February 16, 2009Yale University42 Error Recovery During Swap If ACK missing from at least one router, two cases: (a) Router completed SWAP but ACK not sent (b) Router did not complete SWAP Transient State C-new C-old

February 16, 2009Yale University43 Error Recovery During Swap If ACK missing from at least one router, two cases: (a) Router completed SWAP but ACK not sent (b) Router did not complete SWAP Detect (b) and rollback quickly  Querying router directly may be impossible Transient State C-new C-old

February 16, 2009Yale University44 Error Recovery During Swap If ACK missing from at least one router, two cases: (a) Router completed SWAP but ACK not sent (b) Router did not complete SWAP Detect (b) and rollback quickly  Querying router directly may be impossible Solution: Ask neighboring routers Transient State Do you see C-old data packets? If YES: Case (b): rollback other routers Otherwise, Case (a): no transient state C-new C-old

February 16, 2009Yale University45 Roadmap Motivation and Overview System Basics and Usage System Components  Design and Architecture  Performance Testing  Transaction Support Implementation and Evaluation

February 16, 2009Yale University46 Implementation Kernel-level (based on Linux )  TCP/IP stack support  FIB management  Commitment hooks  Packet cancellation Tools  Transparent software router support (Quagga + XORP)  Full commitment protocol  Configuration UI (command-line based) Evaluated on Emulab (3Ghz HT CPUs)

February 16, 2009Yale University47 Static FIB  300B pkts  No route caching With FIB updates  300B 100Mbps  updates/sec  No route caching Static FIB 300B pkts No route caching

February 16, 2009Yale University48 FIB storage overhead for US Tier-1 ISP Evaluation: Memory Overhead

February 16, 2009Yale University49 Evaluation: Packet Cancellation Accurate streaming throughput measurement  Abilene topology  Real transit traffic duplicated to shadow  Video streaming traffic in shadow

February 16, 2009Yale University50 Evaluation: Packet Cancellation Limited interaction of real and shadow  Intersecting real and shadow flows CAIDA traces  Vary flow utilizations

February 16, 2009Yale University51 Evaluation: Packet Cancellation Limited interaction of real and shadow  Intersecting real and shadow flows CAIDA traces  Vary flow utilizations

February 16, 2009Yale University52 Evaluation: Commitment Applying OSPF link-weight changes  Abilene topology with 3 external peers Configs translated to Quagga syntax Abilene BGP dumps

February 16, 2009Yale University53 Evaluation: Commitment Applying OSPF link-weight changes  Abilene topology with 3 external peers Configs translated to Quagga syntax Abilene BGP dumps Reconvergence in shadow

February 16, 2009Yale University54 Evaluation: Router Maintenance Temporarily shutdown router  Abilene topology with 3 external peers Configs translated to Quagga syntax Abilene BGP dumps

February 16, 2009Yale University55 Evaluation: Router Maintenance Temporarily shutdown router  Abilene topology with 3 external peers Configs translated to Quagga syntax Abilene BGP dumps C-old C-new 41 ms latency 51 ms latency

February 16, 2009Yale University56 Conclusion and Future Work Shadow configurations is new management primitive  Realistic in-network evaluation  Network-wide transactional support for configuration Future work  Evaluate on carrier-grade installations  Automated proactive testing  Automated reactive debugging

February 16, 2009Yale University57 Thank you!