Download presentation
Presentation is loading. Please wait.
Published byMilton Golden Modified over 8 years ago
1
Zurich Research Laboratory IBM Zurich Research Laboratory Adaptive End-to-End QoS Guarantees in IP Networks using an Active Network Approach Roman Pletka IBM Research, Zurich Research Laboratory, Switzerland Burkhard Stiller University of Federal Armed Forces Munich, Germany and Computer Engineering and Networks Laboratory (TIK), ETH Zürich, Switzerland
2
Zurich Research Laboratory IBM Zurich Research Laboratory Agenda Introduction The abstract node model Active networking framework –Overview of security risks. –The hierarchical safety levels Example Applications –E2E services with RSVP signaling and active packets Conclusion
3
Zurich Research Laboratory IBM Zurich Research Laboratory Introduction Why is QoS rarely used today? –ISP’s use massive over-provisioning. –Huge variety in existing QoS architectures (Intserv, Diffserv, ST2+, QoS classes in GPRS). –No end-to-end support for service guarantees in heterogeneous IP networks. (Are user’s willing to pay for this?) –Increasing variety in QoS-provisioning mechanisms (eg., policers, schedulers, AQM schemes) => Need for QoS translation services.
4
Zurich Research Laboratory IBM Zurich Research Laboratory Building E2E services SLA SLS Networking Parameters SLA SLS SLA SLS Service Description End-to-end Service
5
Zurich Research Laboratory IBM Zurich Research Laboratory Node Model for QoS Provisioning in a Proactive Environment E2E Flow Control Domain Policies Congestion Control Buffer Management & Schedulers in Routers Proactive QoS Plane Networking Plane Application Plane Absolute and Relative QoS Description Intserv RSVP Diffserv Active Packets Active Security Hierarchy 0 1 2 3 4 5
6
Zurich Research Laboratory IBM Zurich Research Laboratory Functional Description Discovery process –Leads to initial behavior bounds that specify upper bounds for available resources. –Within the network, not from hosts. Translation phase –Translation of QoS parameters using active code provided by either the network administrator or the application itself. –No simple one-to-one mapping => active code. Surjective code translation is obtained by projection onto the new QoS space, whereas injective code translation needs additional information based on default mappings and/or educated guess methods. Resource Management –Comprises the task of maintaining information on the actual status of resource availability. –Example: maximum bandwidth per traffic class, policies, resources related to the neighborhood, and router services. Feedback Control –Instantaneous traffic characteristics can deviate from QoS reservation.
7
Zurich Research Laboratory IBM Zurich Research Laboratory Security Risks in Active Networks Byte-code language –Byte-code provides architectural neutrality and intrinsic safety properties [SNAP]. –Common operations can be represented with a single byte-codes which leads to high code compactness. –Specific characteristics of the underlying architecture are hidden. Resource bound –Divides networking resources into a two-dimensional vector (local and network part) –Limitation of bandwidth, CPU, and memory usage in nodes. –Enables efficient charging of active packets at the network edge. –Presence of code and data in the same packet does not compromise security. Safety levels –Monitoring control plane activities. –Handling of active networking packets is split into 6 security levels. Sandbox environment –Safe execution environment: Active Networking Sandbox (ANSB) –Information exchange in nodes only feasible using router services.
8
Zurich Research Laboratory IBM Zurich Research Laboratory AN Safety Hierarchy Dynamic router services: registering new router services Authentication of active packets needed using a public key infrastructure. Complex policy insertion and manipulation Simple policy modification and manipulation Creation of new packets and resource-intensive router services (e.g., lookups) Simple packet byte-code Admission control at the edge of the network, trusted within a domain. Running in a sandbox environment, limited by predefined rules and installed router services. Sandbox environment based on the knowledge of the instruction performance. Safety issues solved by restrictions in the language definition and the use of a sandbox environment. No active code present in packets Corresponds to the traditional packet forwarding process. 0 1 2 3 4 5 Safety Level
9
Zurich Research Laboratory IBM Zurich Research Laboratory Example Applications Sender Receiver GGSN SGSN BSS Diffserv Network with Active Nodes Intserv/RSVP Domain Pure Active Network DomainMobile Network using a GPRS Backbone
10
Zurich Research Laboratory IBM Zurich Research Laboratory Conclusion Efficient QoS translation using Active Networks can lead to improved E22 service guarantees. Security risks are bounded to the level of traditional IP forwarding, control, and management. The Active Networking framework benefits from the presence of network processors with specialized hardware assists. Lower safety levels have been implemented on an IBM PowerNP 4GS3. Future work: Dynamic off-loading of forwarding and control functionalities directly onto network processors.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.