Virtual Active Networks Gong Su Mar. 9, 2000. Network Computing Models Traditional: end-to-end, Client-server software at end nodes The network is but.

Slides:



Advertisements
Similar presentations
Chapter 7: Deadlocks.
Advertisements

Path Splicing with Network Slicing
APNOMS2003Fujitsu Laboratories Ltd.1 A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada.
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community.
CS3771 Today: deadlock detection and election algorithms  Previous class Event ordering in distributed systems Various approaches for Mutual Exclusion.
Deployment of MPLS VPN in Large ISP Networks
Concurrency: Deadlock and Starvation Chapter 6. Deadlock Permanent blocking of a set of processes that either compete for system resources or communicate.
Concurrency: Deadlock and Starvation Chapter 6. Deadlock Permanent blocking of a set of processes that either compete for system resources or communicate.
Gong Su Mar. 22, Columbia University, DCC Lab, March 2000 Multi-Edged Network Applications  Traditional net apps: end-end computing  Client-server.
High Performance Computing Course Notes Grid Computing.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
High Performance Router Architectures for Network- based Computing By Dr. Timothy Mark Pinkston University of South California Computer Engineering Division.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Traffic Engineering With Traditional IP Routing Protocols
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Witawas Srisa-an Chapter 6
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
Distributed process management: Distributed deadlock
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Presented by: Randeep Singh Gakhal CMPT 886, July 2004.
Abstraction and Control of Transport Networks (ACTN) BoF
Chapter 7 Configuring & Managing Distributed File System
Network Topologies.
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
CIS 725 Wireless networks. Low bandwidth High error rates.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network Aware Resource Allocation in Distributed Clouds.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
Chapter 7 – Deadlock (Pgs 283 – 306). Overview  When a set of processes is prevented from completing because each is preventing the other from accessing.
DISTRIBUTED COMPUTING Introduction Dr. Yingwu Zhu.
Distributed Computing Systems CSCI 4780/6780. Distributed System A distributed system is: A collection of independent computers that appears to its users.
Computer Architecture and Operating Systems CS 3230: Operating System Section Lecture OS-6 Deadlocks Department of Computer Science and Software Engineering.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Distributed and hierarchical deadlock detection, deadlock resolution
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Chapter 8 Deadlocks. Objective System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Module 11: Configuring and Managing Distributed File System.
Module 11 Configuring and Managing Distributed File System.
Chapter 7: Deadlocks.
OPERATING SYSTEM CONCEPTS AND PRACTISE
Chapter 7: Deadlocks.
CSE 120 Principles of Operating
Concurrency: Deadlock and Starvation
Virtual Active Networks
Chapter 12: Concurrency, Deadlock and Starvation
Operating System: DEADLOCKS
Network Survivability
Chapter 7 Deadlocks.
Virtual Active Networks
COS 561: Advanced Computer Networks
G.Anuradha Ref:- Galvin
Chapter 8: Deadlocks Deadlock Characterization
Presentation transcript:

Virtual Active Networks Gong Su Mar. 9, 2000

Network Computing Models Traditional: end-to-end, Client-server software at end nodes The network is but a packet-transport wire Emerging: edge-to-edge Application services/components deployed at edge nodes Examples: web proxies, firewalls, QoS/bandwidth brokers… Applications need to interact with network resources & topology Configure resources to provide appropriate service Adapt to availability and performance of network components

VAN: Middleware for Edge-Computing VAN is a middleware architecture that enables applications to Configure network topology Allocate node and link resources

A Driving Example A web caching application needs… Coverage for certain network area Connectivity among caching service components Resources to move cached contents Solution: requests a VAN that provides Coverage: spans a ring between AS1, AS2, AS4, and AS5 Resources: provides at least 1mbps for all connections Reliability: prohibits more than 2 virtual links from traversing the same physical link A DC B AS1 AS2 AS5 AS4 A AS3 B C D 1mbps Virtual spec. Physical network Mapping by VAN A DC B 1mbps Logical hierarchy

VAN Contributions Enable applications to configure network Algorithm that maps VAN specification to physical resources Acquire distributed node and link resources Deadlock-free VAN resource provisioning protocol Recover from underlying network failure Protocol that preserves VAN service semantics under failures

VAN Service Arch Components  VAN Local Manager (VLM)  Manages local node resources  Supports deadlock-free VAN provisioning  Monitors & reports resource status  VAN Domain Server (VDS)  Provides VAN services to application  VAN provisioning  Resource acquisition  Performance monitoring  Manages VAN to recover from physical network failure AS1 AS2 AS5 AS4 A AS3 B C D VDS VDS administrative domain Active node with VLM

Specification Mapping  Heuristic mapping algorithm A DC B AS1 AS2 AS5 AS4 A AS3 B C D 1mbps  Sort VNs and PNs by degree; map VN to PN by degree-order  Mark all PL without enough bandwidth for the VLs as infeasible  Each PL has a “mapped-onto” counter, initially  pick a VL and map it to a physical path with lowest maximum counter among all PLs traversed  After each VL is mapped, increment counter and subtract available bandwidth for each PL; mark a PL infeasible as appropriate 1  Repeat until all VLs are mapped

Resource Acquisition Protocol Acquires node and link resources Intra-domain: VDS – VLM Inter-domain: VDS – VLM and VDS – VDS Deadlock among competing VANs for shared resources can occur because One VAN is built in many domains distributedly Many VANs are built in many domains simultaneously Example VDS1 and VDS2 build VAN1 and VAN2 in domain A respectively VDS3 and VDS4 build VAN1 and VAN2 in domain B respectively VAN1 preempts VAN2 in domain A VAN2 preempts VAN1 in domain B VDS1 VDS2 VLM1 VDS3 VDS4 VLM2 VAN1 VAN2 A B

Deadlock Prevention Protocol How does the solution work Assign “weight” to VNs and VLs Each VDS computes a “Progress Index” (PI), indicating “how much” a VAN has been built PIs are globally synchronized and used as the priority for preemption when conflict happens 1 VDS’es request resource VLM detects conflict and initiates arbitration VDS broadcasts to all other VDS’es requesting global PI synchronization Other VDS’es ack sync request VDS’es ack arbitration request VLM notifies VDS’es with the arbitration decision

Failure Recovery When a physical link fails, the VLs it carries must be restored First try Local repair Find an alternative path with adequate resources between the two disconnected AS’es Fast, and preserve original topology But May violate reliability constraint Alternative path may not exist Example Physical link between 2 and 3 goes down Alternative path goes through 2, 1, 4, and Reliability violation Physical link Virtual link

Failure Recovery: Global Repair Local repair may violate reliability constraints or it may not be able to find an alternative path Global repair Computes substitute VL based on global topology and resource information Reconstruct topology when local repair cannot; guarantee reliability constraint But Computationally expensive Communication delay between root VDS and local VDS’es Example Substitute VL computed between 5 and 6, replacing the VL going through 2, 1, 4, and VDS1 VDS2 VDS3 VDS1 VDS2 VDS3 Physical link Virtual link

Schedule End of Spring 2000 Efficiently obtain global topology and resource information Summer 2000 (first half) Heuristics for virtual specification to physical network mapping with constraints Summer 2000 (second half) Algorithm for computing dynamic priority (PI) and analyze conflict resolution protocol Fall 2000 (first half) Efficient local repair mechanism (study MPLS fast rerouting, ATM self-healing, etc.) Fall 2000 (second half) Incremental global repair mechanism