Timed Consistent Network Updates in Software-Defined Networks

Slides:



Advertisements
Similar presentations
Global States.
Advertisements

Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Small-world Overlay P2P Network
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Complexity of Network Synchronization Raeda Naamnieh.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Handout # 4: Scaling Controllers in SDN - HyperFlow
A Survey of Rollback-Recovery Protocols in Message-Passing Systems M. Elnozahy, L. Alvisi, Y. Wang, D. Johnson Carnegie Mellon University Presented by:
Commit Protocols. CS5204 – Operating Systems2 Fault Tolerance Causes of failure: process failure machine failure network failure Goals : transparent:
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
A Survey of Rollback-Recovery Protocols in Message-Passing Systems.
A Simple Neighbor Discovery Procedure for Bluetooth Ad Hoc Networks Miklós Aurél Rónai and Eszter Kail GlobeCom 2003 Speaker: Chung-Hsien Hsu Presented.
Wireless Sensor Networks COE 499 Energy Aware Routing
Lamport’s Logical Clocks & Totally Ordered Multicasting.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Commit Algorithms Hamid Al-Hamadi CS 5204 November 17, 2009.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Time-based Updates in Software Defined Networks Tal Mizrahi, Yoram Moses Technion – Israel Institute of Technology SDNRG, IETF Meeting, Berlin, July 2013.
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
The Totem Single-Ring Ordering and Membership Protocol Y. Amir, L. E. Moser, P. M Melliar-Smith, D. A. Agarwal, P. Ciarfella.
Building Dependable Distributed Systems, Copyright Wenbing Zhao
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Logical Clocks. Topics r Logical clocks r Totally-Ordered Multicasting.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
SPEAKER: MUHAMMAD REZA ZULMAN DATE: NOVEMBER 17, 2014 OPENFLOW SPECIFICATION.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
SDN challenges Deployment challenges
Author:Zarei.M.;Faez.K. ;Nya.J.M.
SDN Network Updates Minimum updates within a single switch
Routing and Switching Fabrics
Packet Switching Datagram Approach Virtual Circuit Approach
Abdul Kader Kabbani (Stanford University)
Controlling the Cost of Reliability in Peer-to-Peer Overlays
6TSCH Webex 06/21/2013.
Operating System Reliability
Operating System Reliability
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Sarah Diesburg Operating Systems COP 4610
How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid Zhuo Lu, University Of South Florida Mingkui Wei,
Operating System Reliability
Operating System Reliability
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Languages for Software-Defined Networks
湖南大学-信息科学与工程学院-计算机与科学系
COS 561: Advanced Computer Networks
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Switching Techniques.
EEC 688/788 Secure and Dependable Computing
CEM 510 Construction Planning & Scheduling Dr Almohawis
Andy Wang Operating Systems COP 4610 / CGS 5765
Non-Distributed Excercises
Operating System Reliability
Congestion Control Reasons:
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
2019/5/2 Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlow ICNP = International Conference on Network Protocols Presenter:Hung-Yen.
Routing and Switching Fabrics
Error Checking continued
Operating System Reliability
Last Class: Naming Name distribution: use hierarchies DNS
Operating System Reliability
M. Mock and E. Nett and S. Schemmer
Presentation transcript:

Timed Consistent Network Updates in Software-Defined Networks 2018.3.16 Speaker: CHAO-YU WANG Advisor: KE, KAI-WEI

Outline Introduction Terminology and Notations Worst-Case Analysis Evaluation Discussion

Introduction Network updates, such as policy and routing changes, occur frequently in software-defined networks . Updates should be performed consistently, preventing temporary disruptions, and should require as little overhead as possible.

Introduction (Cont’d) Ordered Update: At each phase the controller waits until all the switches have completed their updates, and only then invokes the next phase in the sequence. Two-Phase Updates: In the first phase the new configuration is installed in all the middle-stage switches of the network. In the second phase the ingress switches are instructed to start using a version tag that represents the new configuration.

Introduction (Cont’d) Assume that switches keep local clocks that are synchronized to a central reference clock by a synchronization protocol or by an accurate time source such as GPS. The controller sends network update messages to switches using an SDN protocol such as OpenFlow. An update message may specify when the corresponding update is scheduled to be performed

Introduction (Cont’d)

Introduction (Cont’d) 只是特例 kphase

Terminology and Notations The Network Model System consists of N + 1 nodes: a controller c, and a set of N switches. It is assumed that every switch maintains a local clock. Network Updates We define consistent forwarding based on the per-packet consistency definition of . A packet is consistently forwarded if it is processed by all switches either according to the new configuration, after the update, or according to the old one, but not according to a mixture of the two.

Terminology and Notations (Cont’d) Delay-Related Notations

Terminology and Notations (Cont’d) Explicit Acknowledgment OpenFlow currently does not support such an acknowledgment mechanism. Hence, one can either use a different SDN protocol that supports explicit acknowledgment or use an update procedure in which the controller waits for a fixed period (Dc) until the switch is guaranteed to complete the update. Observation : In typical settings δ<Dc. Software timeout ACKnowledgment

Worst-Case Analysis Worst-Case Analysis of Untimed Update Worst-Case Analysis of Timed Updates

Worst-Case Analysis (Cont’d) We use Program Evaluation and Review Technique (PERT) charts to illustrate the worst-case update duration analysis. A node labeled Cj,i represents the event ‘the controller starts transmitting a phase j update message to switch Si’. A node labeled Sj,i represents ‘switch Si has completed its phase j update’.

Worst-Case Analysis (Cont’d) Untimed Updates

Worst-Case Analysis (Cont’d) The weight of each edge indicates the maximal delay to complete the transition from one event to another Cstart and Cfin represent the start and finish times of the update procedure, respectively.

Worst-Case Analysis (Cont’d) Untimed Updates

Worst-Case Analysis (Cont’d) Untimed Updates With Garbage Collection

Worst-Case Analysis (Cont’d) Untimed Updates With Garbage Collection

Worst-Case Analysis (Cont’d) Worst-Case-Based Scheduling

Worst-Case Analysis (Cont’d) Timed update

Worst-Case Analysis (Cont’d) Timed vs. Untimed Updates

Worst-Case Analysis (Cont’d) Timed vs. Untimed Updates Proof:

Worst-Case Analysis (Cont’d)

Worst-Case Analysis (Cont’d) Proof

Worst-Case Analysis (Cont’d) Using Acknowledgments

Worst-Case Analysis (Cont’d)

Worst-Case Analysis (Cont’d) We observe that for a sufficiently large value of Dn the timed approach produces a lower update duration. DgT = Dn + δ < Dn + Dc < Dn+ (NG2 - 1) * Δ + Dc = DgUT

Fine Tuning Consistency By setting the update times T1, T2,...,Tk, Tg1,...,Tgk, the controller can play with the consistency- scalability tradeoff; the update overhead can be reduced at the expense of some inconsistency, or vice versa.

Evaluation Timed vs. Untimed Updates

Evaluation (Cont’d) Fine Tuning Consistency Constant delay — each link had a constant delay that was configured to the value we computed as described above. Exponential delay — each link had an exponentially distributed delay.

Evaluation (Cont’d) Simulation: Using ACKs

Evaluation (Cont’d) Simulation: Using ACKs

Evaluation (Cont’d) Simulation: Using ACKs

Discussion Failures Security Considerations If the controller detects a switch failure before an update is scheduled to take place, it can send a cancellation message to all the switches that take part in the scheduled update, thus guaranteeing an all-or-none behavior. Security Considerations This problem can be mitigated by using an explicit acknowledgment mechanism

Reference T. Mizrahi, E. Saat and Y. Moses, "Timed Consistent Network Updates in Software-Defined Networks," in IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3412-3425, December 2016.