Jon Turner Extreme Networking Achieving Nonstop Network Operation Under Extreme Operating Conditions DARPA.

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Contents Shortcomings of QoS in the Current Internet About OpenFlow
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
CCNA – Network Fundamentals
Traffic Shaping Why traffic shaping? Isochronous shaping
Jon Turner Extreme Networking Achieving Nonstop Network Operation Under Extreme Operating Conditions.
Jon Turner Extreme Networking Achieving Nonstop Network Operation Under Extreme Operating Conditions Fred.
Copyright: RSVP The ReSerVation Protocol by Sujay koduri.
A Case for Relative Differentiated Services and the Proportional Differentiation Model Constantinos Dovrolis Parameswaran Ramanathan University of Wisconsin-Madison.
Chapter 5 The Network Layer.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Multicast Communication
1 CHEETAH software OCS/AAA module Routing decision module Signaling module VLSR module Include TL1 proxy for Cisco MSPP Router disconnect module.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
Lawrence G. Roberts CEO Anagran September 2005 Advances Toward Economic and Efficient Terabit LANs and WANs.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
Computer Networking Quality-of-Service (QoS) Dr Sandra I. Woolley.
Jon Turner (and a cast of thousands) Washington University Design of a High Performance Active Router Active Nets PI Meeting - 12/01.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
Tiziana Ferrari Quality of Service Support in Packet Networks1 Quality of Service Support in Packet Networks Tiziana Ferrari Italian.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Chapter 13 – Network Security
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Applied research laboratory David E. Taylor Users Guide: Fast IP Lookup (FIPL) in the FPX Gigabit Kits Workshop 1/2002.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Router Architecture Overview
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Module 10: How Middleboxes Impact Performance
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Page 1 Network Addressing CS.457 Network Design And Management.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Lecture 12: Reconfigurable Systems II October 20, 2004 ECE 697F Reconfigurable Computing Lecture 12 Reconfigurable Systems II: Exploring Programmable Systems.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
Washington WASHINGTON UNIVERSITY IN ST LOUIS 1 DTI Visit - John DeHart- 4/25/2001 Agenda l WU/ARL Background – John DeHart (15 minutes) l DTI Background.
Forwarding.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
TeraPaths: A QoS Enabled Collaborative Data Sharing Infrastructure for Petascale Computing Research The TeraPaths Project Team Usatlas Tier 2 workshop.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Jon Turner Extreme Networking Achieving Nonstop Network Operation Under Extreme Operating Conditions DARPA.
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
Network Layer IP Address.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
Instructor Materials Chapter 6: Quality of Service
Instructor Materials Chapter 9: Transport Layer
What’s “Inside” a Router?
Demonstration of a High Performance Active Router DARPA Demo - 9/24/99
Bridges and Extended LANs
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
DHCP: Dynamic Host Configuration Protocol
Computer Networks Protocols
Presentation transcript:

Jon Turner Extreme Networking Achieving Nonstop Network Operation Under Extreme Operating Conditions DARPA PI Meeting, July 23-26, 2002

2 - Jonathan Turner - July 24, 2002 Project Overview Motivation »data networks have become mission-critical resource »networks often subject to extreme traffic conditions »need to design networks for worst-case conditions »technology advances making extreme defenses practical Extreme network services »Lightweight Flow Setup (LFS) »Network Access Service (NAS) »Reserved Tree Service (RTS) Key router technology components »Super-Scalable Packet Scheduling (SPS) »Dynamic Queues with Auto-aggregation (DQA) »Scalable Distributed Queueing (SDQ)

3 - Jonathan Turner - July 24, 2002 Switch Fabric IPPOPP FPX SPC TI IPPOPP FPX SPC TI IPPOPP FPX SPC TI IPPOPP FPX SPC TI IPPOPP FPX SPC TI IPPOPP FPX SPC TI Control Processor Prototype Extreme Router Field Programmable Port Ext. Network Interface Device Reprogrammable Application Device SDRAM 128 MB SRAM 4 MB Field Programmable Port Extenders Smart Port Card Sys. FPGA 64 MB Pentium Cache North Bridge APIC ATM Switch Core Transmisson InterfacesEmbedded Processors

4 - Jonathan Turner - July 24, 2002 Resource Reservation in Internet? Bandwidth reservation can provide dramatically better performance for some applications. Obstacles to resource reservation in Internet. »distaste for signaling protocols »perceived complexity of IntServ+RSVP »requires end-to-end deployment »little motivation for service providers How to get resource reservation in Internet? »keep it simple focus on top priorities - one-way unicast flows avoid complex signaling - leverage hardware routing mechanisms »make it useful when only partially deployed »provide motivation for ISPs to deploy it

5 - Jonathan Turner - July 24, Mb/s available 5 Mb/s available 2 Mb/s available 5 Mb/s available 20 Mb/s available Basic LFS Operation One way, unicast setup with partial reservation. »complete reservations locally when bandwidth released Optional ack returned by far-end access router. Reservation may terminate explicitly or time out. May alter reserved bandwidth but no re-routing. A B Reserve 8 Mb/s to B Select best next hop Reserve bandwidth Select path and attempt to reserve Select path and reserve Complete reservation

6 - Jonathan Turner - July 24, 2002 Soft Reservations Basic LFS provides firm reservations. »user guaranteed bandwidth until releases Can extend to provide soft reservations as well. »soft reservation can be adjusted by the network as traffic changes »can be intermixed with firm reservations to provide a firm minimum, plus more bandwidth as available Uses of soft reservation. »apps. that need guaranteed minimum and can sometimes use more, but can adjust use to what’s available »more rapidly responding congestion control for traditional best-effort traffic

7 - Jonathan Turner - July 24, 2002 Basic IP Option for LFS lengthop.Rrate flags Arate code IP header (fixed part) trace IP payload Code identifies LFS option. Operations »request firm reservation »request soft reservation »release state Flags »sender status request »sender network status request »public network status request »intra-domain status request »congested path Rrate: requested rate. Arate: allocated rate. Trace used by each domain to track usage. Allocated rate stored at “last hop” router for status generation F.P. rates with 4 bit mantissa, 4 bit exponent. »specify rates from 64 Kb/s to 4 Gb/s, 6% “granularity”

8 - Jonathan Turner - July 24, 2002 Use of Trace Field Network providers need to monitor LFS usage for network management and accounting purposes. »trace field used by ingress router of each domain to mark LFS packets with domain-specific identification »egress router of each domain maintains record of each LFS flow, including copy of trace field »end-to-end records created through off-line accounting resolution mechanisms domain Udomain Vdomain W X Y Z B A XYZ acct. record [A,B,..] thru X acct. record [A,B,..] thru Z acct. record [A,B,..] thru Y

9 - Jonathan Turner - July 24, 2002 Status Reporting Basic LFS option supports sender status and trace field for accounting. Network providers likely to want more. »sender net status allows LFS service verification »public net status allows “end-to-end” status check »intra-domain status for verifying local status »each “extra” status report requires insertion of requestor’s IP address, increasing LFS option length ISP V rcvr. LAN sender LANISP U sender status sender net status public net status intra-domain status

10 - Jonathan Turner - July 24, 2002 Partial Deployment Receivers need not be LFS-aware. »web site may use LFS to reserve bandwidth for streaming media - users benefit, even without LFS-aware hosts Issues with non-contiguous LFS domains. »route changes may create “orphan reservations” »no simple way to determine status reporter No support for non-contiguous LFS domains. »LFS router forwarding to a non-LFS router (or host) strips LFS option and implements status reporting status report includes IP address of reporting router, letting sender know how far the reservation went Public IP carrier can accept LFS option from client networks (LAN) even if client net is not LFS-aware. Clients may use tunnel to access LFS service.

11 - Jonathan Turner - July 24, 2002 Regulating LFS Use - Net Access Svc Permitting unconstrained access to LFS creates big security vulnerability. Limit use to authorized users. Limit number of reservations and amount of reserved bandwidth by authorized users. »access router keeps record and enforces limits »complication - user may use LFS from multiple locations maintain records in distributed set of servers - each server keeps records for some fraction of the users - use hashing to select Access router needs means to identify user. »host IP address insufficient (DHCP, NAT) »encryption-based authentication (IPSEC) Combine access control with usage accounting. What special issues arise with multiple domains?

12 - Jonathan Turner - July 24, 2002 LFS Video Demo Configuration Wavelet-coded video with and without LFS. »competing datagram traffic »with no reservation, lost packets cause poor video quality »with reservation, high quality preserved video source cross traffic sources cross traffic sinks video sink 100 Mb/s links

13 - Jonathan Turner - July 24, 2002 Video Demo - No Reservation video flow - no reservation datagram cross traffic flow 1 datagram cross traffic flow 2 video source cross traffic sources all sinks

14 - Jonathan Turner - July 24, 2002 Video Demo - With Reservation video flow - with reservation datagram cross traffic flow 1 datagram cross traffic flow 2 video sink cross traffic sinks

15 - Jonathan Turner - July 24, 2002 Competing LFS Flows no reservations flow 1 - no reservation flow 2 - reservation added flow 3 - no reservation reservation for flow 2 sources sinks sink 2 sink 1

16 - Jonathan Turner - July 24, 2002 Partial Reservation flow 1 - partial reservation made sink 1 flow 2 source 1 sink 3

17 - Jonathan Turner - July 24, 2002 Completing Partial Reservation flow 1 - completes partial reservation sink 1 sink 3 flow 2 - drops reservation

18 - Jonathan Turner - July 24, 2002 Addition of Flow 3 Reservation sink 3 flow 3 - adds reservation sink 2

19 - Jonathan Turner - July 24, 2002 Performance of LFS at Single Link m = number of flows link can carry exponential session times for flows, infinite queue OC-48 link can carry 200 flows of 12 Mb/s very few flows experience any delay Pareto distributed session times make little difference

20 - Jonathan Turner - July 24, 2002 Sensitivity to Load and Hop Count at 90% load, less than 1 flow in 100 delayed more than 12% of session time delay probability scales linearly with number of hops

21 - Jonathan Turner - July 24, 2002 Overload Performance with infinite buffer, no sessions get small delays (10%) with no buffer most sessions still succeed buffer reduces rejection fraction at low loads

22 - Jonathan Turner - July 24, 2002 Summary LFS provides simple reservations for QoS. »no complex signaling, wire speed setup »limited deployment can be broadly beneficial »support for usage monitoring & accounting gives network providers a motivation to deploy service Network access service for regulating usage. »preliminary specification has been developed »uses IPSEC for host/user authentication Performance analysis, simulation study underway. Routing issues. »evaluate QoS routing with multiple-choice forwarding »link state distribution for inter-domain routing »inter-domain routing policies