A Deterministic End to End Performance Verification Architecture

Slides:



Advertisements
Similar presentations
1 Metro Ethernet Forum OAM An Update Matt Squire Hatteras Networks.
Advertisements

LAN Devices 5.3 IT Essentials.
NORDUnet Nordic infrastructure for Research & Education NSI in the SDN Environment (from perspective of an NSI fellow) Jerry Sobieski NORDUnet Presented.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
NORDUnet Nordic infrastructure for Research & Education LHCONE “Point-to-Point Connection Service” Service Definition Jerry Sobieski.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
SDN and Openflow.
I/O Channels I/O devices getting more sophisticated e.g. 3D graphics cards CPU instructs I/O controller to do transfer I/O controller does entire transfer.
1 K. Salah Module 4.0: Network Components Repeater Hub NIC Bridges Switches Routers VLANs.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
An Architecture for Differentiated Services
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Connecting LANs, Backbone Networks, and Virtual LANs
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Connectivity Devices Hakim S. ADICHE, MSc
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Chapter 6 – Connectivity Devices
LAN Switching and Wireless – Chapter 1
Salim Hariri HPDC Laboratory Enhanced General Switch Management Protocol Salim Hariri Department of Electrical and Computer.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
UNIT -1. DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form.
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
XStream: Rapid Generation of Custom Processors for ASIC Designs Binu Mathew * ASIC: Application Specific Integrated Circuit.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Emir Halepovic, Jeffrey Pang, Oliver Spatscheck AT&T Labs - Research
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
The Difference Between Router and Switch Not everyone knows: ADVANTAGES OF SWITCH:  Switches offer higher performance than bridges and hubs.  Switches.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Univ. of TehranIntroduction to Computer Network1 An Introduction to Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Network No network resources exist outside a network Transport resources inside network –Link, Nodes, ports – are used to create connections between network.
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO PathSolutions.
Topology Issues in Inter-Domain Connection Services Jerry Sobieski (NORDUnet) The Cynic’s Perspective & Jeroen van der Ham (University of Amsterdam) The.
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
Advanced Network Tap application for
Lecture (2).
Welcome Network Virtualization & Hybridization Thomas Ndousse
Planning and Troubleshooting Routing and Switching
NSI Topology Thoughts on how topology fits into the NSI architecture
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
Network Packet Brokers
Understanding the OSI Reference Model
SWITCHING Switched Network Circuit-Switched Network Datagram Networks
Chapter 7 Backbone Network
Module 5 - Switches CCNA 3 version 3.0.
Data Link Issues Relates to Lab 2.
Firewalls Routers, Switches, Hubs VPNs
Data collection methodology and NM paradigms
Specialized Cloud Architectures
Network Architecture By Dr. Shadi Masadeh 1.
Chapter 2 Switching.
Requirements Definition
Chapter-5 Traffic Engineering.
Switching Chapter 2 Slides Prepared By: -
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
In-network computation
Multiprocessors and Multi-computers
Presentation transcript:

A Deterministic End to End Performance Verification Architecture Jerry Sobieski NORDUnet October 20, 2012

The Problem Emerging Connection Services that offer “guaranteed” performance require a means of: A) determining if a Connection is performing as requested B) determine where (and why) a Connection is failing Guaranteed service require substantially

Deterministic Performance Verification Can we deterministically measure the performance of real traffic across a domain? Can we do so without perturbing the flow? Can we do so in such a fashion that we can determine where along the path performance problems are occuring? Network domain STP-A STP-Z How do we verify the throughput from STP-A to STP-Z?

How do we measure traffic across a domain? Existing models pose specialized performance measurement servers Active measurements are performed that replace or perturb existing flows – the flows we want to understand! Traffic characterization can only be measured between these specific Measurement Points (MPs). the MP to MP path often includes path segments and/or network elements that are not directly part of the path of interest Some tests often transit components with indeterminant performance characteristics E.g. a “Ping” incurs indeterminant latency based upon processor loads.

What do we need to do better? Passive measurement Measure the actual user data flows instead of artificial flows Consistent measurement points Architecturally predictable measurement locations.. Everywhere. Architecturally deterministic measurement points themselves… simple, cheap, and effective. Highly accurate timing What resolution is required to characterize 100 Gbps packet flows? Appropriate software tools Capture/analysis Automated User and/or Operations oriented Secure

A “Performance Flow Correlator” PV Flow correlator 4 5 Flow sample (Realtime/background, step/full sampled) 3 Ingres Flow “tap” (splitter/hdw replication) 2 Circular Flow buffer (time stamped capture servers) 1 Ingress flow Egress flow STP-1 STP-2 user flow Border switch Border switch External domain External domain Intra-Domain Flow Correlation

How the Flow Correlator Works The “flow tap” design can be implemented at every domain boundary, at every interface. Such mirroring capabilities are often already incorporated in switching interfaces – just never used for systematic operational monitoring and fault localization Optical Passive splitters can be easily inserted inline at the interface where the device does not have such capabilities Electrical signals can also be tapped using mirror ports. The tap, when enabled, leads directly to a local flow buffer. The flow buffer can be sized and configured to capture an entire flow, or it can be sized to sample flows according to some rule or policy. The correlation can be done in real time if engineered to do so… or the flow can be captured and stored for later background analysis. … a few seconds later, or a few days later. Correlation can be performed periodically, using short samples or real flows

An inter-Domain “Flow Correlator” PV Flow correlator Flow samples are FTP’d (background processing) or streamed (real time processing) to correlator The inter-domain flow transfer Should use dedicated circuits to avoid affecting other traffic Inter-Domain Transport Infrastructure Flow buffer Flow buffer Egress flow Ingress flow STP-A user flow STP-Z Border switch Border switch Inter-Domain Flow Correlation Source Domain Destination Domain

End to End PV Architecture Aruba Bonaire Curacao Dominica MP-B1 MP-C2 MP-D1 MP-D2 MP-A1 MP-A2 MP-B2 MP-C1 B Stp Z Stp A D C This data plane architecture can deterministically localize faults to a particular domain. Automated agents can perform the analysis NSI Query() primitive can be used to provide both the multi-domain path and the the boundary STPs A simple directory can map STPs to Flowbuffers Or an active agent (NSA?) can be requested to validate path performance.

A look at the border switch Each STP must be able to mirror its specific data stream to the flow buffer Thus, physical channels must be tapped (fiber, UTP, etc.) And virtual channels must be tapped (vlans, LSPs, TDM channels, etc.) The tap should be placed as close to the ingress/egress STP as possible. Outside of elements such as buffers or framers Doing so provides for better fault localization. The mirrored flow must preserve performance fidelity between the tap and the flow buffer capture interface (i.e. no mirror aggregation or buffering prior to capture.) The flow buffer should be sized to process the number and size of simultaneous flows it will be expected to process

Timing Simple packet recording at source and destination can provide accurate packet loss insights even without timing But not performance fidelity Inter-packet arrival times can be measured accurately locally at each end Can reveal jitter characteristics after correlation Presta packet capture cards can do 10 nS time stamping at 10 Gbps. These cards need an external [accurate] clock Other similar cards can also do packet filtering and other intelligent offloading. Could be useful for sourcing streams with very accurate pacing, or payload signatures.

Highly accurate distributed timing Emerging techniques in metrology allow extremely accurate timing to be distributed though the photonic network. Accurate to 10^-17 seconds (!) Advanced NICs can be field programmed to time stamp packets to 10 nanoSecond resolution Driven by external [distributed] clock A 64 byte packet arrives every 512 nS on a 1 Gbps link A 64 B packet arrives no more than every 51 nS on a 10 Gbps link. E2E packet Latency can be computed with distributed global clock to 10 nS intervals…for each packet in a large flow (!)

Interdependence NSI SDN