RSVP Refresh Overhead Reduction by State Compression Lan Wang, Andreas Terzis, Lixia Zhang UCLA with input from Paxson, Braden, Berson, the interim meeting.

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
,< 資 管 Lee 附錄 A0 IGMP vs Multicast Listener Discovery.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Copyright: RSVP The ReSerVation Protocol by Sujay koduri.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.
CS Summer 2003 Lecture 9. CS Summer 2003 FILTERSPEC Object FILTERSPEC Object defines filters for selecting a subset of data packets in a session.
Delivery, Forwarding, and Routing
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Gursharan Singh Tatla Transport Layer 16-May
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
1Traffic Eng. © 1999, Cisco Systems, Inc. Cisco Systems Change to Hello Protocol Three way handshake Carry both Source and Destination Instance When establishing.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
IP Forwarding.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Network Layer4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 Routing Principles 4.3 Hierarchical Routing 4.4 The Internet (IP) Protocol.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
CS470 Computer Networking Protocols
RSVP WG 13th July RSVP State Reduction (consensus proposal) refresh-reduct-03.txt 45th IETF,
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
EE 122: Integrated Services Ion Stoica November 13, 2002.
Label Distribution Protocols LDP: hop-by-hop routing RSVP-TE: explicit routing CR-LDP: another explicit routing protocol, no longer under development.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
CIS679: RSVP r Review of Last Lecture r RSVP. Review of Last Lecture r Scheduling: m Decide the order of packet transmission r Resource configuration.
Internet Multicasting Routing: DVMRP r DVMRP: distance vector multicast routing protocol, RFC1075 r flood and prune: reverse path forwarding, source-based.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
22.1 Network Layer Delivery, Forwarding, and Routing.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
Analysis on Two Methods in Ingress Local Protection.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
Chapter 11 User Datagram Protocol
Chapter 5 Network and Transport Layers
MZR: A Multicast Protocol based on Zone Routing
EE 122: Lecture 16/17 (Integrated Services)
RSVP: A New Resource ReSerVation Protocol
THE NETWORK LAYER.
Chapter 5 Network and Transport Layers
ECE 544 Protocol Design Project 2016
ECE 544 Protocol Design Project 2016
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Staged Refresh Timers for RSVP
Distributed Systems CS
Advanced Computer Networks
Bridges and Link Layer Switches
Distributed Systems CS
Presentation transcript:

RSVP Refresh Overhead Reduction by State Compression Lan Wang, Andreas Terzis, Lixia Zhang UCLA with input from Paxson, Braden, Berson, the interim meeting and others

2 Goals Reduce the refresh overhead of RSVP –one refresh message per session per refresh period --> one message per RSVP neighbor Minimize re-synchronization delay –when sessions added/deleted –when two neighbors discover inconsistencies in RSVP state Keep the soft-state nature of RSVP –Refresh messages are sent periodically.

3 Approach Digest –a compressed version of the RSVP state shared between two nodes (made of a set of signatures) Digests sent periodically to neighbor nodes –refresh RSVP state –discover inconsistency Raw RSVP messages sent only when –state changes: e.g. Tspec/Rspec changes, session addition/deletion –re-synchronizing session state

4 Digest-capable neighbor discovery Request ACK when sending raw RSVP msgs –Add a D-bit to MESSAGE_ID object to indicate compression-capable Three cases: –Receive ACK with D-bit set in MESSAGE_ID neighbor is compression-capable –Receive ACK with D-bit off in MESSAGE_ID neighbor is compression-incapable –Receive PathErr or ResvErr message: “legacy” RSVP neighbor

5 Limitations Lost automatic route adaptability in original RSVP Rely on specific notification to adjust to –routing changes –multicast group membership changes do not handle non-RSVP cloud case SA B C D Non-RSVP Cloud Original Route New Route

6 Neighbor Data Structure Neighbor Struct | IP Address | | OutSession |--> Hash Table for outgoing sessions | OutDigest |--> top level of OutDigest tree |RefreshOutTimer | | IDLastSent | |OutDigestTimeout| | InSession |--> Hash Table of incoming sessions | InDigest |--> top level of InDigest tree | CleanupInTimer |

7 Session Signature Computation Objects included in computation

8 digest Hash Table M Entries M: number of slots in the hash table multiple sessions may hash to the same slot compute a signature for each slot neighbor nodes send this list of M signatures in place of raw RSVP refresh msgs Digest Computation (simple version)

9 digest Hash Table Level-1 signatures Level-2 signatures M Entries M: number of entries in the hash table N: number of signatures contained in a digest (fit into one packet) neighbors exchange digest msg periodically Digest Computation (high compression version) Digest Tree:

10 MESSAGE_ID Object | |A|D| Flags | Epoch | | Message_ID | Object format defined in draft-berger-rsvp- refresh-reduct-03.txt We added D-bit in flags field for neighbor discovery

| Level | Group | | Reserved | Number of Signatures | | // signature list // | Class in 10bbbbbb range Level: level of signatures in digest tree Group: Block of signatures inside level Number of Signatures: # of signatures in object Signature list: a list of checksums DIGEST Object

12 1. Digest Message (Msg Type 14) ::= [ ] [ ] –Digest message must contain a MESSAGE_ID object with Ack_Requested bit set 2. DigestErr Message (Msg Type 16) ::= [ ] –Negative ack, contains digest computed at receiver New Messages

13 Normal Case Example PATH ACK(d ) Digest ACK New Neighbor ! Set Digest Timer RSVP Msgs Received digest matches with local InDigest Digest Refresh timer times out

14 Recovery Procedure DigestErr contains set of (top level) signatures computed at the receiving side –Sender finds which of the N signatures differ Sends new Digest message(s) of next lower level rooted at mismatched signatures –Follow same procedure until reach the bottom of the digest tree –Refresh all sessions corresponding to the mismatched signatures

15 Digest (t 1 ) ACK(t 1 ) PATH DigestErr (t 2 ) Sync! Digest (t 2 ) More RSVP Msgs DigestErr ACK msgs Digest (t 3 ) ACK(t 3 ) Sync hronized! Recovery Example ACK Start recovery Lower-level Digest More lower-level Digest and DigestErr msgs Raw RSVP msgs

16 Digest Tree requires O(T+M) space. Computation cost of signature: depend on the compression algorithm –MD5 and CRC linear on the size of the message Update signature of a hash slot: f(T/M*s) –s is signature size, f() cost to compute signature –T/M: average number of sessions in a hash slot Update tree: (log N M – 1)* f(N*s) Digest Computation Costs

17 Summary of Changes Required Protocol –1 new object (DIGEST) –2 new message types (Digest, DigestErr) State –Neighbor Data Structure per neighbor hash table signature tree

18 Features Efficient state re-synchronization Allow individual nodes to choose original RSVP refreshes or the refresh reduction Backward compatibility with the current RSVP implementation Incremental digest computation when part of the session(s) changes state

19 PATH(Ad) Ad Ad’ PATH(Ad’) ADSPEC & POLICY_DATA POLICY & ADSPEC –These objects can change locally –Current RSVP spec keeps object received Need to keep copy of the forwarded object to calculate digest for that neighbor Digest refreshes trigger updates for these objects How to detect changes –always assume new –expect explicit notification