Improving Internet Availability. Availability of Other Services Carrier Airlines (2002 FAA Fact Book) –41 accidents, 6.7M departures –99.9993% availability.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Grand Challenges in Networking Nick Feamster CS 7001.
Path Splicing with Network Slicing
Improving Internet Availability with Path Splicing Nick Feamster Georgia Tech Joint work with Murtaza Motiwala and Santosh Vempala.
Improving Internet Availability with Path Splicing Murtaza Motiwala Nick Feamster Santosh Vempala.
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Improving Internet Availability with Path Splicing Nick Feamster Georgia Tech.
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Theory Lunch. 2 Problem Areas Network Virtualization for Experimentation and Architecture –Embedding problems –Economics problems (markets, etc.) Network.
A Narrow Waist for Multipath Routing Murtaza Motiwala Bilal Anwer, Mukarram bin Tariq David Andersen, Nick Feamster.
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
15-441: Computer Networking Lecture 26: Networking Future.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Measurement and Monitoring Nick Feamster Georgia Tech.
Postmodern Internet Architecture Defense Zhaosheng Zhu Kevin Tan.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Network Topologies.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Distributed Asynchronous Bellman-Ford Algorithm
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
1 Cabo: Concurrent Architectures are Better than One Jennifer Rexford Princeton University Joint work with Nick Feamster.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Networking Functions of windows NT Sever
CCNA 1 Module 10 Routing Fundamentals and Subnets.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Next Few Classes Networking basics Protection & Security.
Chapter 2 Network Topology
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Multimedia & Mobile Communications Lab.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Introduction to Active Directory
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Network Layer Lecture Network Layer Design Issues.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Multi-layer software defined networking in GÉANT
Martin Casado, Nate Foster, and Arjun Guha CACM, October 2014
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Planning and Troubleshooting Routing and Switching
COS 561: Advanced Computer Networks
Presentation transcript:

Improving Internet Availability

Availability of Other Services Carrier Airlines (2002 FAA Fact Book) –41 accidents, 6.7M departures – % availability 911 Phone service (1993 NRIC report +) –29 minutes per year per line –99.994% availability Std. Phone service (various sources) –53+ minutes per line per year –99.99+% availability Credit: David Andersen job talk

Internet Availability Various studies (Paxson, Andersen, etc.) show the Internet is at about 2.5 nines More critical (or at least availability-centric) applications on the Internet At the same time, the Internet is getting more difficult to debug –Increasing scale, complexity, disconnection, etc. Is it possible to get to 5 nines of availability? If so, how? What role should the network play?

Inherent Availability vs. Reactive Diagnosis What happens when a failure occurs? (At least) three options –Nothing –Automatic masking/recovery –Diagnosis + Semi-manual intervention (Augustin, Renata) When is automatic recovery appropriate? What features for diagnosis should the network provide?

(How) should the network provide inherent availability? Idea: compute backup in advance –No dynamic routing, just dynamic forwarding –End systems (routers, hosts, proxies) detect failures and send hints to deflect packets –Kind of like fast reroute…but a bit more extreme Various proposals in this space –Multi-router configurations, e.g.

Path Splicing: Main Idea Step 1 (Perturbations): Run multiple instances of the routing protocol, each with slightly perturbed versions of the configuration Step 2 (Parallelization): Allow traffic to switch between instances at any node in the protocol t s Compute multiple forwarding trees per destination. Allow packets to switch slices midstream.

Availability: Paths vs. Content What definitions of availability are appropriate? –Downtime Fraction of time that path exists between endpoints Fraction of time that endpoints can communicate on any path –Transfer time How long must I wait to get content? (Perhaps this makes more sense in delay-tolerant networks, bittorrent-style protocols, etc.) Some applications depend more on availability of content, rather than uptime/availability of any particular Internet path or host

Diagnosis User or operator takes over when the network doesnt fix things automatically Diagnosis will never be fully automatic –Task: put functions in place to make network (mal)functions as intuitive as possible –Make the operators (or users) more efficient…

(How) should the network support diagnosis? More network support means potentially more information to users and operators –…potentially at the cost of performance –Forwarding performance, filters, or measurment/monitoring? What functions should the router (or other on- path elements) provide?

Data-Plane Accountability Problem: Network elements drop packets, fail, and otherwise give rise to poor performance One Solution: In-Band Path Diagnosis Routers keep track of number of packets seen per flow Each router stamps each packet with current flow counter value If current counter value does not equal routers expected packet count for that flow, router marks packet IP Header New Shim Header Transport header High-level Overview

Scalability vs. Reactivity Various ways to get more data –More frequent monitoring –More data types –More vantage points Advantages –More paths, links, services, etc. –Potentially faster reaction But…data reduction is key –Operators/users are not at a loss for data about the network. They need ways to process it. –More monitoring data means more overhead (storage, bandwidth, etc.)

Active vs. Passive Monitoring Active monitoring can provide more direct indicators of path quality, service availability, etc. –But…cant monitor all possible paths What combination of active and passive monitoring is appropriate?

What role should end systems/cooperation play? Various previous work in peer-to-peer troubleshooting –Tomography –NetProfiler / CoopNet (Padmanabhan) –Cooperative troubleshooting (Wang) –Sharing IDS logs In what contexts do these make sense? –Internet –Wireless settings

Medium-Sized Challenges

Some Problems Competing business interests threaten –Stability –Connectivity Malicious hosts and network entities threaten –Trust –Resource allocation Growing scale threatens –Robust, secure, efficient network operations Governments threaten –Free speech –Privacy –Efficiency

Problem: Insecurity Cant trust the control plane –BGP: Route hijacks (intentional and unintentional) –DNS: Insecure name resolution Cant trust the data plane –No guarantee for where packets will go No accountability or auditing capabilities No strong forms of identity

Security: To-Do Data plane security –No assurances about where traffic will actually go –Monitoring/stemming unwanted traffic is hard Control plane security –Defense against route hijacks, etc. Accountability (spoofing prevention, auditing, etc.) –For data-plane performance –For unwanted traffic

Problem: Manageability Too easy to misconfigure the network Correct operation depends on correct configuration –Can future networks be intrinsically robust?

Management: To-Do Automated provisioning Configuration, management, and maintenance at a higher layer of abstraction Fast, distributed fault detection Where possible, eliminate knobs without eliminating flexibility

Problem: Scale Increasing number of users, end hosts, etc. Network connectivity has become a commodity –At the same time, the network is becoming more difficult to manage –Network providers must keep adding customers –Cost of bandwidth, equipment is plummeting –Management costs begin to dominate

Scale: To-Do Scalable addressing that permits multihoming –Traffic engineering, fast updates, etc. –Related topic: mobility Scalable mechanisms for path diversity (path selection, etc.)

Designing for Selfishness: Goals Providers, producers and consumers must benefit from participating –Without eyeballs, content has no value –Without content, the eyeballs will bail out –Without a network, eyeballs cant meet content –Without content or eyeballs, no need for a network

Internet Wish-List Availability Accountability Mobility Manageability/Intrinsic Correctness Support for monitoring Assurances about traffic

What Has Worked? Packet switching Layering Congestion control

What Might We Revisit? Single-path routing Monitoring support –Better traffic sampling algorithms to cope with evolving requirements (its no longer just about billing) Naming –Poor support for mobility –Poor support for naming content Addressing –Very poor correspondence to identity Business models/selfishness

Possible Outcome: Many Internets Run many different networks simultaneously on the same infrastructure –No clear distinction between architecture and services –Develop specialized architectures for specialized applications Application or topology-specific routing protocols Virtualization of physical resources as a tool for building new networks –Virtual link establishment and virtual routers –Substrate for deploying overlays is new waist –This substrate is the new Internet