Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Deployment of MPLS VPN in Large ISP Networks
NENA Development Conference | October 2014 | Orlando, Florida Local PSAP IP Network Infrastructure and NG9-1-1 Michael Smith, DSS Nate Wilcox, Emergicom.
1 Aman Shaikh: June 02 UCSC INFOCOM 2002 Avoiding Instability during Graceful Shutdown of OSPF Aman Shaikh, UCSC Joint work with Rohit Dube, Xebeo Communications.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
The Future Internet: A clean-slate design? Nicholas Erho.
Networks and Distributed Systems: Project Ideas
1 Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University.
Traffic Engineering With Traditional IP Routing Protocols
RIT Campus Data Network. General Network Statistics Over 23,000 wired outlets Over 14,500 active switched ethernet ports > 250 network closets > 1,000.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
Network Protocols Designed for Optimizability Jennifer Rexford Princeton University
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Wresting Control from BGP: Scalable Fine-grained Route Control UCSD / AT&T Research Usenix —June 22, 2007 Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren,
Routing problems are easy to cause, and hard to diagnose (“Happy operators make happy packets”) Jennifer Rexford AT&T Labs—Research
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
Security administrators The experts need better tools too!
A victim-centric peer-assisted framework for monitoring and troubleshooting routing problems.
Lecture 11 Intrusion Detection (cont)
New Challenges in Cloud Datacenter Monitoring and Management
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—5-1 Implementing a Highly Available Network Understanding High Availability.
What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California.
Network Topologies.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
Formal checkings in networks James Hongyi Zeng with Peyman Kazemian, George Varghese, Nick McKeown.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
UCSC 1 Aman ShaikhWIRED Panel on Intra-domain Routing Panel on Intra-domain Routing WIRED 2003 Workshop on Internet Routing Evolution and Design Aman Shaikh.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Industrial Issues in Software Performance
Cluster Reliability Project ISIS Vanderbilt University.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Basic component of Network Management Woraphon Lilakiatsakun.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Basic component of Network Management Woraphon Lilakiatsakun.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
UCSC 1 Aman ShaikhWIRED Position Statement Position Statement WIRED 2003 Workshop on Internet Routing Evolution and Design Aman Shaikh University of California,
Towards a Well-Managed Next Generation Internet! Hot Research Topics in Next Generation Internet Panel NY Systems/Networking Summit, NYU Aman Shaikh AT&T.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
D1 - 08/12/2015 Requirements for planned maintenance of BGP sessions draft-dubois-bgp-pm-reqs-02.txt
NETWORK MANAGEMENT FCAPS.
Security Management Process 1. six-stage security operations model 2 In large networks, the potential for attacks exists at multiple points. It is suggested.
Yaping Zhu with: Jennifer Rexford (Princeton University) Aman Shaikh and Subhabrata Sen (ATT Research) Route Oracle: Where Have.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Header Space Analysis: Static Checking for Networks Broadband Network Technology Integrated M.S. and Ph.D. Eun-Do Kim Network Standards Research Section.
Distributed Network Monitoring in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
Multi-layer software defined networking in GÉANT
Jian Wu (University of Michigan)
Understand the OSI Model Part 1
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Software Defined Networking (SDN)
Lecture 10, Computer Networks (198:552)
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16, 2006

WIRED Position Statement 2006 Slide 2 Why Care About Network Administrators? Running networks is a challenging job –Includes service provider backbones, enterprises, educational networks Network core not simple as it was supposed to be –Scale –Geographical span –Diversity –Constant churn Internet is now required to be more than best effort –Real-time mission critical applications –We rely on the Internet for pretty much everything

WIRED Position Statement 2006 Slide 3 Lack of Management Support IP networks were not built with manageability in mind –SNMP, Syslog and Netflow are supported by routers –Support is often not adequate Lack of support most acutely felt at the routing layer –Hard to answer even basic questions like: “What path did traffic take from router A to B some x hours ago?” “I can’t reach my customer; when did his/her route disappear from my network and why?”

WIRED Position Statement 2006 Slide 4 Life is not that Bad! Networking research has started focusing on the management issues –INM workshop at SIGCOMM 2006 –NetTS workshop at SIGCOMM 2004 –Other workshops and conferences Several papers have appeared in research forums –New management paradigms (e.g., 4D architecture) –New control plane architectures (e.g., IRSCP) –Management tools (e.g., Route Monitors, Beacons) –Control plane anomaly detection

WIRED Position Statement 2006 Slide 5 Long Way to Go… If we want to achieve PSTN-like 5-nine reliability And support all kinds of applications And have ubiquitous computing and communication

WIRED Position Statement 2006 Slide 6 So What Can Researchers Do? Configuration Management Trouble-shooting Network maintenance and upgrade Security

WIRED Position Statement 2006 Slide 7 Configuration = headaches! Configuration commands are often primitive, un- intuitive and complicated –How to design better models and abstractions? So that operators can express their intent more directly and flexibly Configuration happens on a per-device basis –How to move to network-level configuration? Too many configurable parameters and knobs –How to move from trial-and-error and arcane default values to science and engineering for setting the parameters? –Can we design systems that can adaptively set and change settings based on … Performance goals Observed performance

WIRED Position Statement 2006 Slide 8 Trouble-shooting: Whose Fault is it Anyway? What’s in a Router’s Mind? –SNMP and syslog are not adequate, and not reliable –Route monitors are great but need careful engineering rules and procedures –What is really needed: “passive sessions” over which routing information can be collected Send routes over these sessions to monitoring session Also include some root cause information, especially for BGP Routing protocols interact in strange ways –Better isolation of protocols –Better models when protocols do interact Failures often occur over time in gradual manner –Need methods for pro-active detection and prediction Lack of correlation across time, space and layers!

WIRED Position Statement 2006 Slide 9 Maintenance Grief! Maintenance and upgrade require disruption in service –Need to modify routing protocols so that they can be upgraded without dropping sessions E.g., graceful restart mechanisms –Design routers so that they can be upgraded in service E.g., through seamless transfer of control between route processors Scheduling upgrades is not always easy –Scale is huge Size of the network and the number of customers –Too many constraints –Big question: how to gauge the impact of a proposed maintenance/upgrade on network performance and customers? Maintenance/upgrades often go bad –Need robust maintenance/upgrade procedures –How to back out smoothly out of such tasks? Number of tasks often too high –How to design robust routers that require fewer maintenance?

WIRED Position Statement 2006 Slide 10 Security: Attack of the worms, viruses, … Security vulnerability of routing protocols is well known Quite a few solutions have been proposed But no deployment  Need to come up with solutions that can be (incrementally) deployed

WIRED Position Statement 2006 Slide 11 In Closing… Happy Network Administrators  Happy Packets  Happy Users