Network Cost Services for Network-Aware FI Applications

Slides:



Advertisements
Similar presentations
Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Advertisements

Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Resource Management – a Solution for Providing QoS over IP Tudor Dumitraş, Frances Jen-Fung Ning and Humayun Latif.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Infrastructure to Application Exposure - USE CASE: CDN – Jan Seedorf IETF 83, Paris i2aex BoF Monday, March
Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh.
Design and Implementation of a Single System Image Operating System for High Performance Computing on Clusters Christine MORIN PARIS project-team, IRISA/INRIA.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
Content Distribution Internetworking IETF BOF December 12, 2000 Phil Rzewski Gary Tomlinson.
Multicast in Information-Centric Networking March 2012.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
TICTOC -Topology-Discovery and Clock-Discovery
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Unit 3 Virtualization.
Confluent vs. Splittable Flows
VPN Extension Requirements for Private Clouds
Use Case for Distributed Data Center in SUPA
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
NET 536 Network Security Firewalls and VPN
Greg Bernstein Young Lee
Introduction to Load Balancing:
Content Distribution Networks
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
PROTEAN: A Scalable Architecture for Active Networks
Introduction and Overview of Network and Telecommunications (contd.)
3 | Analyzing Server, Network, and Client Health
CHAPTER 3 Architectures for Distributed Systems
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Understanding the OSI Reference Model
Introduction to Networks
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic
Cloud Computing By P.Mahesh
Virtual LANs.
Introduction to Cloud Computing
Internet Networking recitation #12
Early Measurements of a Cluster-based Architecture for P2P Systems
Mobile edge computing Report by Weiqing huang.
Computer Network Performance Measures
AGENT OS.
i-Path : Network Transparency Project
Data Security for Microsoft Azure
Goals Introduce the Windows Server 2003 family of operating systems
Multimedia and Networks
Tussles for Edge Network Caching
Quality of Service For Mobile IP.
Computer Network Performance Measures
Data and Computer Communications
An Update on Multihoming in IPv6 Report on IETF Activity
دیواره ی آتش.
A tool for locating QoS failures on an Internet path
Specialized Cloud Architectures
AP Functional Needs of CAPWAP
Fundamental Concepts and Models
PMIP6 extensions for inter-access handovers and flow mobility
Content Delivery and Remote DNS services
EE 122: Lecture 22 (Overlay Networks)
Next-generation Internet architecture
Kostas Kolomvatsos, Christos Anagnostopoulos
Requirements of Computing in Network
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Tokyo OpenStack® Summit
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Network Cost Services for Network-Aware FI Applications EC FIARCH WORKSHOP GEORGE XILOURIS, NCSR “DEMOKRITOS”

Network Awareness Present model: implicit derivation of network status (e.g. TCP) Applications assume network conditions by observing their own performance Implicit network awareness has survived during the years, and works well for most of the applications It is also scalable

Network Awareness Gradual paradigm shift from host-centric to content-centric communication Existing implicit mechanisms may be not as efficient due to new communication architectures, beyond the traditional client-server: peer-to-peer CDNs/Content-centric networks in-network clouds etc. Content is distributed into the network, rather than concentrated in a single server -> simultaneous communication with tens, hundreds, or even thousands of peers. Assessing the communication with each of these peers at application level via the usual in-band methods would pose significant overhead in the network, besides requiring a considerable amount of time.

A Network Cost Service A scalable and efficient way to provide explicit Network Awareness Offered by Network Operators (or third-parties) “Network Cost” (NC) assessment for any given pair or group of network endpoints. NC could be instantly exploited at application level in order to optimize operations such as in-network content placement, peer selection, prioritization and load balancing. A similar approach is promoted by the Application Layer Traffic Optimisation (ALTO) WG of the IETF

Use cases peer-to-peer file sharing and streaming - for optimizing p2p communication via selection of “best peers” i.e. peers with lower NC one-to-one and one-to-many realtime audiovisual communication – for a priori optimizing stream format and rate according to NC distributed caching, Content-Delivery Networks (CDN) and Information Centric Networking (ICN) – for choosing optimal locations for caching content within the network in-network clouds – for efficient load balancing, traffic distribution and resource transfer to optimal locations, including Virtual Machine (VM) migration.

Generic Architecture

Generic Architecture Network Cost Query: pair or group of endpoints’ addresses, optionally application type (for application-aware networks) Response: Network Cost vector where ci(a,b), denotes a certain network metric between endpoints a and b (e.g. hop count, one-way delay, average packet loss, jitter/delay variation etc.) Can be transformed to a scalar value, taking into account the sensitivity wi of the specific application against each of the aforementioned metrics

Proof-of-concept implementation Customised SNMP agents on Linux-based routers On-demand execution of active end-to-end measurements according to the OWAMP protocol (RFC 4656) Configuration of measurements and collection of results over SNMP Network Cost provided to applications over SOAP/XML protocol NC elements: Number of hops traversed Average One-Way Delay (OWD) Average packet loss Average jitter Percentage of duplicates Also tested on DiffServ-enabled configurations (Network Cost varies upon different DSCP values)

Proof-of-concept implementation

Considerations Security and Network Operator Privacy; authentication of the querying entity, anti-(D)DoS protection etc. Inter-domain operation – “assembling” NCs across different domains Including the access network; separate assessment of the access link and combining results with edge/core network statistics so as to form end-to-end cost in a scalable manner

Thank you! www.medianetlab.gr xilouris@iit.demokritos.gr +30 210 650 3166