Design of a Scalable Clearing House Architecture Lakshminarayanan Subramanian Chen-Nee Chuah Ramakrishna Gummadi ICEBERG Design Review Jan 12, 2000.

Slides:



Advertisements
Similar presentations
APNOMS2003Fujitsu Laboratories Ltd.1 A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada.
Advertisements

QoS Routing for MPLS Networks Employing Mobile Agents By: Sergio Gonzalez-Valenzuela and Victor C. M. Leung Presented by: Nathan Balon.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Progress Report Wireless Routing By Edward Mulimba.
AHOP Problem and QoS Route Pre-computation Adam Sachitano IAL.
Resource Provisioning and Bandwidth Brokering for IP-core Networks Chen-Nee Chuah ISRG Retreat Jan 10-12, 2000 Problem: How to provide end-to-end QoS in.
Resource Management – a Solution for Providing QoS over IP Tudor Dumitraş, Frances Jen-Fung Ning and Humayun Latif.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
1 CS 240: Network Routing Michalis Faloutsos. 2 Class Overview Expose you the general principles and highlight some interesting topics in routing Background.
Predictive End-to-End Reservations via A Hierarchical Clearing House Endeavour Retreat June 19-21, 2000 Chen-Nee Chuah (Advisor: Professor Randy H. Katz)
Presented by Henning Schulzrinne Columbia University
1IMIC, 8/30/99 Constraint-Based Unicast and Multicast: Practical Issues Bala Rajagopalan NEC C&C Research Labs Princeton, NJ
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Decoupling Policy from Mechanism in Internet Routing Alex C. Snoeren and Barath Raghavan University of California, San Diego.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
Aggregate Scheduling – Enhancing Throughput in Collective Tasking Systems L. Subramanian Randy H.Katz Michael J. Franklin.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
Abstraction and Control of Transport Networks (ACTN) BoF
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Network Layer Goals: understand principles behind network layer services: –routing (path selection) –dealing with scale –how a router works –advanced topics:
SAvPS – úvod Genči 2009 (bsaed on Tanenbaum’s slides.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Common Devices Used In Computer Networks
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
4: Network Layer4-1 Schedule Today: r Finish Ch3 r Collect 1 st Project r See projects run r Start Ch4 Soon: r HW5 due Monday r Last chance for Qs r First.
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Applicazione del paradigma Diffserv per il controllo della QoS in reti IP: aspetti teorici e sperimentali Stefano Salsano Università di Roma “La Sapienza”
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Two-Tier Resource Management Designed after the Internet’s two-tier routing hierarchy Separate packet forwarding from admission and resource allocation.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Zurich Research Laboratory IBM Zurich Research Laboratory Adaptive End-to-End QoS Guarantees in IP Networks using an Active Network Approach Roman Pletka.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Layer Goals: Overview:
Anup K.Talukdar B.R.Badrinath Arup Acharya
Presentation transcript:

Design of a Scalable Clearing House Architecture Lakshminarayanan Subramanian Chen-Nee Chuah Ramakrishna Gummadi ICEBERG Design Review Jan 12, 2000

Basic Questions in Mind!!!  What is a Clearing House?  What are the basic requirements of the Clearing House?  What are the services it supports?  What are the goals of our design?  What are the assumptions we make in our design?

Clearing House  Coordinates interactions between the various ISPs in the network.  What kind of interactions?  Performs path discovery and resource reservation.  Services wide-area call requests.  Provide QoS guarantees.  Secure billing services.  Support for multicast and mobility.

Present Scenario H1 H3 ISP1 ISP3 ISP2 H2 ISP4

Goals of our design  Scalability- throughput, state maintained  Optimize network utilization  Dynamic call-routing  Continuous path monitoring for QoS  Reduce response time for call requests  Support multicast, mobility and secure billing  Recovery from link,node and packet failures  Security and Privacy

How do we achieve it!!!  Build a logical hierarchy in the network  Distribute state and resources among the nodes in the hierarchy and create a distributed database  Aggregate requests and bound queue size  Hierarchical and dynamic routing of call requests  Continuous monitoring of resources  Separate resource reservation and call-setup

Assumptions  Edge routers can collect traffic statistics and estimate bandwidth requirements  Control and data paths are separated  Clearing House and ISP trust each other  Routers can measure queueing delay statistics  Possible to introduce a monitoring system into existing ISP architecture

Clearing House Structure ISP1 ISP3 ISP2 ISP4 ICH ECH

Clearing House Infrastructure  External Clearing House(ECH) as third party agent to coordinate inter-ISP traffic.  Internal Clearing House(ICH) services intra-ISP traffic and acts as a monitoring agent for external traffic.  ECH organized as a hierarchy of nodes.  ECH stores inter-ISP network state and ICH stores intra-ISP network state in a distributed manner.

Hierarchical Structure  Divide network into non-intersecting basic domains(e.g.. Cluster area codes)  Recursively join physically adjacent domains to form larger logical domains.  Generate a hierarchical tree of domains in the network.  Associate a distributed ECH with every domain in the tree.

Hierarchical Clearing House ISP1 ISP3 ISP2 ISP4 ICH ECH ICH ECH Domain

External Clearing House  Performs hierarchical routing and computes near optimal path for call requests.  Aggregates call requests.  Collects statistics on resource reservations and delay statistics from ISPs.  Performs extra resource reservations for call requests if necessary.  Monitors performance of traffic.  Stores billing prices of ISPs within its domain

Internal Clearing House  Every ISP has an ICH.  Routes intra-ISP calls.  Monitors and predicts incoming and outgoing traffic in edge routers  Performs advanced reservations for predicted traffic and updates ECH.  Determines link reservations in ISP and updates traffic routing table of routers.

Hierarchical Routing 1a 1b 1c Inter-domain and Intra-domain paths Domain 1

Clearing house state  Billing information is present in CH of basic domain.  Each CH maintains aggregated state of its domain.  Calls between two sub-domains of its domain.  Aggregated connectivity graph between domains.  Reservation and delay status along links and nodes in the graph.  Pricing information between domains.

Other Enhancements  Caching  Cache computed inter-domain paths  RxW scheduling  Maximize throughput without affecting response time.  Measuring QoS parameters  Multicast support  Dynamic path routing to support mobility  Secure billing architecture  Fault tolerance

Support for Multicast and Broadcast Trees Nodes up in the hierarchy find inter-domain multicast tree. Local nodes find intra-domain optimal tree. Edge router

Level 0 L1 Moving Object Domain Structure Scalable Infrastructure for supporting Mobility

Strengths  State of network distributed among various CH nodes.  Aggregation of call requests.  Response time depends on locality.  Bounded queue size.  Path discovery is distributed.  Localized billing – makes it real-time.  Core routers do not maintain much state info.  Caching, scheduling improve performance.

Clearing House Design: Resource Reservation Strategies Chen-Nee Chuah ICEBERG Design Review Jan 12, 2000

ISP 1 ISP 2 ISP 3 Example Scenario  Quality of Service? Resource Reservation H2 H3H1

ISP 1 ISP 2 ISP 3 Example Scenario H2 H3H1 SLA SLA: Agreements that describe the volume of traffic exchanged, bandwidth reserved and price

Challenges  How is the SLA between two ISPs established?  How do SLAs reflect dynamic traffic patterns?  What happens when it involves more than 2 ISPs? => Clearing House provides a scalable approach to address these questions

Hierarchical Clearing House source ISP n destination Edge Router CH 1 ICH CH 1 CH 2 ISP2  Distributed database & bandwidth brokering agent reservation status, % link utilization, traffic predictor establish advanced reservation (based on traffic predictor) Updates ISP1 Adapt Reservation ICH

Resource Reservation Infrastructure H1 ISP1 H2 ICH Edge Router ICH Assume the Edge Router  collects traffic statistics  e.g. average aggregate incoming and outgoing traffic volume  estimates dynamic change of bandwidth requirements  statistical techniques (Kalman filter)  sends regular updates to LCH  aggregates reservation requests ISP2

Static & Dynamic Reservations H1 ISP1 H2 ICH Edge Router Internal Clearing House  Maintain intra-ISP reservation status  Establish static reservations based on mean aggregate traffic for different time of the day.  Adapt reservations on a smaller time-scale based on existing reservation and bandwidth predictor.  Send regular update to GCH Static Reservation Dynamic Reservation CH

Properties  Aggregation of Signaling  Resource reservation requests are aggregated at various levels (ER -> ICH, ICH-> CH 1 etc.)  De-couple notifications & reservation requests  notifications: updates on reservation status, % link utilization, traffic predictor  reservation requests: initiation of SLA renegotiations  Hierarchical Approach  Static and Dynamic Reservations  reduce reservation setup time  compensate for the coarse granularity of the notifications

Clearing House Hierarchical Tree Notifications (every  u s) - Reservation status - Link utilization - Bandwidth predictor CH 1 ICH CH 2 CH 1 ICH Adapt Reservations - Advance reservations - Process reservation requests Aggregate reservation requests (T a ) LCH

Int-Serv Approach  End-to-end notifications & reservation requests  ISP 2 notifies next-hop ISPs and negotiate new SLA with them. When all downstream ISPs accept the SLAs, an ISP notifies upstream ISPs and set up new SLAs.  When original SLA is accepted, all SLAs from source to sink are updated. source ISP1 ISP n destination BB ISP2

Diff-Serv Approach  Limited or no notifications  Trade-off end-to-end QoS for scalability source ISP1 ISP n destination Edge Router BB ISP2

Evaluation  Overall Performance Metrics  Trade-offs between scalability, QoS and signaling complexity Effect of aggregation on QoS –e.g. % blocking/dropping Choice of signaling between CHs  Link efficiency  Bandwidth Estimator  How well do the predictors track the traffic fluctuation? Window of measurement?

Clearing House Design: Billing, Security and Privacy Ramakrishna Gummadi ICEBERG Design Review Jan 12, 2000

Basic Goals  Support Scalable, Secure and Correct Billing  Support Trust Management for Traffic Monitoring  Support Privacy Management

Tasks while supporting Secure and Scalable Billing  Must scale to millions of calls per day  Must perform authentication (in both directions), authorization, and correct billing

Approaches to support Secure and Scalable Billing  Use a level of indirection through authorization and billing tickets  Generate these tickets offline  Perform offline settlements with the user and various ISPs  Use aggregation for storing and verifying tickets to reduce storage space  Use X.509 certificates, passwords or Public-key challenge/response for mutual authentication

Notes on Authorization and Billing Tickets  Both used as level of indirection, for achieving scalability, while maintaining high security and requiring little trust  Both like Kerberos, a scalable security service, using tickets for authentication and secrecy  Both acquired by the user once at the beginning, and used as needed

Notes on Authorization and Billing Tickets (contd..)  Authorization tickets used to establish that call corresponds to resources reserved  Billing tickets used to charge the user for time spent on the call  Billing tickets can be returned by the user at end of call, or more can be acquired during duration of call, as needed, to maintain correct billing records

Performance Optimizations  Can use shared-key techniques in using authorization tickets  A lot depends on the degree of trust between the CH and the ISPs (though the ISPs themselves don’t need to trust each other)  If trust possible, we can use shared-key cryptography for billing (no non-repudiation support)  Lots of performance and storage improvement through aggregation

Trust Management  CH can incorporate a Trust Management module to:  Provide a standard, general-purpose mechanism for specifying application security and credentials  Directly authorize security-critical actions, like network monitoring  Bind keys directly to authorization records to perform specific tasks  Describe delegation of trust and subsume the role of public key certificates

Privacy Management  Privacy management very difficult in the current Internet, more so in ICEBERG (because of billing)  Privacy of users and participating ISPs needed  User privacy with respect to participating ISPs achieved by anonymization in the form of indirect authorization and billing tickets