KP Architecture (v4) Dietterich’s summary of discussions with Clark, Langley & Ramming July 10-12, 2003 Revised September 2, 2003 Revised September 23,

Slides:



Advertisements
Similar presentations
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Jaringan Komputer Lanjut Packet Switching Network.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
CCNA 2 v3.1 Module 6.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Research Gísli Hjálmtýsson - AT&T Research - 1 Programmable Networks of Tomorrow (Pronto): The Programmable Interface of Pronto.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
CISCO NETWORKING ACADEMY Chabot College ELEC IP Routing Protocol Highlights.
Lecture 10 Overview. Border Gateway Protocol(BGP) De facto standard for Internet inter-AS routing allows subnet to advertise its existence to rest of.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Common Devices Used In Computer Networks
VLAN Trunking Protocol (VTP)
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
VLAN Trunking Protocol (VTP)
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
10/8/2015CST Computer Networks1 IP Routing CST 415.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
Module 1: Exploring Replication. Overview Understanding SQL Server Replication Setting Up Replication Understanding Agents in Replication Securing Replication.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
University of Windsor School of Computer Science Topics in Artificial Intelligence Fall 2008 Sept 11, 2008.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
VLAN Trunking Protocol (VTP)
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
STAR Scheduling status Gabriele Carcassi 9 September 2002.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
ETHANE: TAKING CONTROL OF THE ENTERPRISE
ICMP ICMP – Internet Control Message Protocol
Intelligent Agents Chapter 2.
Routing.
CPE 401 / 601 Computer Network Systems
Chapter 3: Dynamic Routing
Design Unit 26 Design a small or home office network
Dynamic Routing and OSPF
COS 561: Advanced Computer Networks
Distributed Systems CS
Delivery, Forwarding, and Routing of IP Packets
BGP Instability Jennifer Rexford
Computer Networks Protocols
Routing.
Distributed Systems CS
Presentation transcript:

KP Architecture (v4) Dietterich’s summary of discussions with Clark, Langley & Ramming July 10-12, 2003 Revised September 2, 2003 Revised September 23, 2003 Revised October 7, 2003

Proposal: Hierarchical Reactive System Multiple layers Each layer has the following components –Sensors: measure aspects of network state, external inputs –State Model: (partial) description of the state of the network –Control Settings: “frobs” that higher-level layers can modify –Reasoning Engine: decides what actions to take based on the above three items –Effectors: actions that it can take (may involve setting lower-level frobs) Sensors State Model Control Settings Reasoning Engine Effectors

Example: Packet Forwarding and Routing Link State State Model Control Settings Shortest Path Algorithm Effectors Input Queues State Model Routing Table Hash Lookup Output Queues Forwarding Updates OSPF

Multilayer Architecture Higher layers exhibit –larger spatial and temporal scale –more complex reasoning –more complex models

How High Can We Go? Packet Forwarding OSPF MANET: dynamic service repositioning AS-level design?

AS-level Design and Configuration engineer Device Status/ Catalogs State Model: Available Components Goals and Policies Reasoning Engine Design net admin Device/ Link Status State Model: Current Status Design Reasoning Engine Transition Plan Device/ Link Status State Model: Current Status Plan Reasoning Engine Effectors Design Level Planning Level Deployment Level

Merge/Join Negotiation is needed at multiple levels –Negotiation of conflicting requirements (e.g., same mail security policy) –Coordination of design choices (e.g., use same type of routers) –Coordination of deployment schedules (e.g., cutover on same day) Goals and Policies Reasoning Engine Design net admin Design Reasoning Engine Transition Plan Reasoning Engine Effectors Design Level Planning Level Deployment Level Goals and Policies Reasoning Engine Design net admin Design Reasoning Engine Transition Plan Reasoning Engine Effectors

Why Do We Need Active Probing? If our multi-layer architecture could observe all relevant state changes and respond to them, then we would not need a separate diagnostic system Hypothesis: The internet is too large to make it practical to deliver all relevant information to edge-located reactive systems Conclusion: There is still a need for problem- driven diagnosis that actively gathers information to localize and repair network faults

Example: Missing mail When ISI changes their spam filter, do they notify the KP? Does some reactive level warn the sysadmin that this change will prevent large s from reaching the KP list? Maybe, but maybe this is the intent of the sysadmin. Does the KP propagate this information to Chris Ramming (and all other internet users) to tell him that IF he sends large s, they will not be distributed to the KP list? Impossible! It seems more efficient to wait for edge-users to complain and then diagnose the problem / policy conflict

Example: AS Prepending Typo Could a reactive level detect this typo and alert the net admin? If not (e.g., because some AS’s will not deploy the reactive architecture), then it must be detected during diagnosis In this sense, diagnosis is a backup to the reactive stack

Requirements for Diagnosis Inputs –End-user FIXIT requests –Sensor-detected problem signatures Knowledge –Desired behavior (“success stories”)? [Where does this come from? How is it represented?] Actions –Active sensing across multiple levels and regions expensive sensors network tomography Outputs –Detected policy conflicts –Detected configuration conflicts –Detected remote configuration errors I’m assuming local errors would be prevented and/or immediately caught by reactive levels

Scenarios The following slides give a series of scenarios that describe how the architecture might work.

Scenario 1: Policy Change Soldier requests satellite image download to help escape from tight position. Request is refused by firewall. He invokes the Diagnoser. Diagnoser determines that this is a policy conflict and alerts the Negotiator who resolves the conflict (with the help of the Network Administrator or Commanding Officer?). The policy is changed, the Configuration Manager changes the firewall rules, and these are uploaded into the firewall by the Executor. The soldier is told that he can download the image now. [We need to make this whole process fast!]

Scenario 2: Equipment Loss A router is destroyed as a result of a vehicle accident. The Design Level monitors the validity of the design it produced (which was based on a set of available components). It notices the mismatch between the current set of components and the original set upon which the design was based. It constructs a new design. The Planning Level then notices that the design has been changed, so it modifies its plan for implementing the design. The Deployment Level then makes appropriate changes to implement the plan (which may require asking technicians to install a new router, run new cables, etc. In a wireless network, it might just require assigning the routing function to a different node.)

Scenario 3: Move and Reassemble Network Part of the network is to be disassembled and moved to a new location. The Network Administrator changes the Goals to indicate this. The Designer changes the Design to reflect the changed goals. The Planner creates a schedule of network changes so that the overall network remains up throughout the move. It then interacts with technicians to execute the schedule. Note that incidents (like loss of connectivity) may occur during the schedule, but those will not be treated as problems if they are consistent with the design and schedule. Unanticipated problems (General X insists on being connected for 10 more minutes) may be detected (by a change in device availability at the Planning level? Or by General X complaining to the Diagnosis system?)

Scenario 4: Merge Two Networks Two networks are to be merged. The network administrators of both networks indicate this by modifying the goals in their respective networks. The Negotiators for the networks then analyze the requirements of the two networks to identify policy and goal conflicts (e.g., network 1 does not support internet radio downloads, but network 2 does). Network administrators may need to be involved to resolve these conflicts. When the conflicts have been resolved, the requirements can be updated and merged. The result is that there is now only one Designer, one Planner, and one Deployment level. The Designer constructs the new design, the Planner constructs an implementation schedule for putting it in place. Then the plan is Deployed.

Scenario 5: Peer Two Networks Two networks are to be connected (e.g., as peers) but not merged. The network administrators add a "peering" goal to their requirements. The Negotiators for the networks then analyze the requirements to identify policy and goal conflicts. When the conflicts have been resolved, then the Designers coordinate to construct designs for the two networks (e.g., by choosing the number and locations of peering points). The Planners coordinate to construct roll-out plans for the peering points. The Deployment levels negotiate on the exact timing of the peering.