Complexity and Degrees of Freedom in Network Design Michael Sinatra University of California, Berkeley 17 July 2007 Internet2/ESCC Joint Techs.

Slides:



Advertisements
Similar presentations
Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Advertisements

The Monty Hall Problem Madeleine Jetter 6/1/2000.
Learning in ECE 156A,B A Brief Summary Li-C. Wang, ECE, UCSB.
A Students Survival Guide to Computers and the Internet By: Invir Gill Tech 9 Per: 7.
IT in the Real World A look at IT in a Fortune 500 company Ed Nelson.
Welcome to World Civ! Please take a paper out of the bellwork box.
Background of the Meyer-Briggs Type Indicator (MBTI) personality indicator The essence of the theory is that random variation in behavior is actually orderly.
A Teenager’s Guide To Asexuality Am I Ace?. Am I Asexual? You’re not into sex the way other people are. You’re not sure you really get what people mean.
ENGL1001 – American Literature F. Scott Fitzgerald – The Great Gatsby (1925) Dr. John Masterson 5 th Lecture July 2012.
Chapter 3 Summary and Notes
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
Teacher & Counselor Orientation Connecting Education With Life.
“Speed dating” discussion questions
Transition Stage of a Group Characteristics of the transition stage Transitional phase is marked by feelings of anxiety and defenses Members are: Testing.
Distributed Systems Brief Overview CNT Mobile & Pervasive Computing Dr. Sumi Helal University of Florida.
Applications: History to Future Why end-to-end shouldn’t be dead Pete Resnick Protocol standards bonehead Qualcomm Technologies, Inc.
University of WashingtonComputing & Communications Ten Minutes on Five Nines Terry Gray Associate VP, IT Infrastructure University of Washington Common.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2005.
Ch 20 Q and A IS333, Spring 2015 Victor Norman. Universal Service Means every computer can talk “directly” with every other one. A message is not addressed.
What is the probability that it will snow on Christmas day in Huntingdon?
Network Topologies.
Your Profile. Why it might suck and how to fix it. Your Profile. Why it might suck and how to fix it. Posting. Posting. Why people never respond to your.
Network Address Translation (NAT)
Becoming a Professional Network Marketer Part I By Gediminas Grinevicius.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
Chapter 3 Review.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
1 Computer Networking Dr. Mohammad Alhihi Communication and Electronic Engineering Department Philadelphia University Faculty of Engineering.
How Networks work?.
PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.
BOOKS THAT MADE A DIFFERENCE TO… Amanda Blaha. Can reading really make a difference? I have never really been big into reading. But, once I find a book.
1 3. System reliability Objectives Learn the definitions of a component and a system from a reliability perspective Be able to calculate reliability of.
Chapters 5 & 6 Thought distortions & Interventions.
Networking Components BY: JOSON ABRAHAM LTEC 4550.
Application configures network: specifics, problems, solutions Vasiliy Tolstoy EMC RCOE v 0.5.
Mental Maths LO: To add together coins and notes. Can you add together the coins and notes you see? Type your name and send: Next Slide.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
NETWORKING COMPONENTS Mujeeb Alikhan LTEC Hub A hub connects to multiple computers in a network. When traffic is transmitted thru the hub all devices.
Assignment # 3 Networking Components By: Jeff Long.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Friday, February 25, 2011 Good morning, English 11! Good morning! Please get a book and sit down ASAP! We need to hurry! Turn in late papers in the basket.
Eric Osborne ARNOG 2016 NFV (and SDN). Introduction About me: 20+ years in Internet networking: startup, Cisco, Level(3) Currently a principal architect.
The Design Philosophy of the DARPA Internet Protocols [Clark 1988] Nick McKeown CS244 Lecture 2.
TDD Unit tests from a slightly different point of view Katie Dwyer.
Induction, Analogy, Causation. There are two kinds of arguments: inductive and deductive Inductive arguments are much more common, but it is also much.
«My future profession»
Lesson 15 Total Cost of Ownership
Alcatel-Lucent Security Products Configuration Example Series
The sign of success.
Exploring the Functions of Networking
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Access to business data: Is the balance of risks right?
Does Nature Always Nurture? Deborah Mugno, Ed. D.
Lesson 15 Total Cost of Ownership
Does the Gartner Hype Cycle Invalidate Itself? By: Patrick Crouch
Introduction to Computers
Computer Security for Businesses
CSCD 303 Essential Computer Security
 What is Topology  Categories of Topology  Definition, structure, advantage and disadvantage of all of the following topologies: o Mesh o Bus o Ring.
Cognitive Distortions
CSCD 303 Essential Computer Security
Move from Scripted Manual Testing to Scenario-Based Testing
Jasmine Thornton L. Johnson
Access to business data: Is the balance of risks right?
Do now w/b Can you solve this riddle? There are no passengers on the bus at the beginning of its journey. Three people get on. Then two more people get.
CSCD 303 Essential Computer Security
Presentation transcript:

Complexity and Degrees of Freedom in Network Design Michael Sinatra University of California, Berkeley 17 July 2007 Internet2/ESCC Joint Techs

Enhanced Gratuitous Logo Slide (EGLS)

Inspirations Terry Gray, Scott Sagan, Charles Perrow, Todd LaPorte, Martin Landau Poorly-designed networks and network disruption devices Greg Bell, Greg Travis and everyone who sent me interesting examples after the 5-9s talk

Redundancy in Systems Single points of “failure” Probabilistic analysis of redundancy –Redundant components can reduce the chances of failure –A component with a 10% failure probability can be made redundant with another component with a 10% failure probability and yield a 1% system-failure probability –But there’s a BIG assumption here!

Common-mode failures Components must be fully redundant! Are they? Classic example: aircraft engines Can you think of some networking examples?

Common-mode failures - example FW Switch Outside Inside

“Difficult” Failures You must be this tall to really break the network.

The Jordan Baker Phenomenon Nick:You're a rotten driver, either you ought to be more careful or you oughtn't drive at all. Jordan: I am careful. Nick: No you're not. Jordan: Well, other people are. Nick: What's that got to do with it? Jordan: They'll keep out of my way, It takes two to make an accident. Nick: Suppose you met somebody just as careless as yourself? Jordan: I hope I never will, I hate careless people. That's why I like you.

The Jordan Baker Phenomenon The problem is, there are too many careless devices on the network! Client Firewall Net LBServer

Virtualization risks Adds complexity (but reduces it too!) Tightens coupling!

Common-mode failures - example Switch /FW Hosts Router To border

High-reliability organizations Demanded by high-reliability systems Organizational redundancy Change management Multiple approval/sign-off

High-reliability organizations Organizations can be made redundant in the same way as systems… …with many of the same problems –Common-mode failures –Non-linear complexity –And more…

Social shirking/buck passing Not really an analogous concept in physical systems Change-management difficulties

Overcompensation Has to do with the way physical systems are designed and operated Does anycast DNS encourage bad behavior?

Conclusions How do we deal with all of this? –Points of failure? Really points of freedom (and that’s a bad thing) –We need to reduce degrees of freedom in networks, not necessarily increase redundancy! –Networks need to get simpler, not more complex!

Conclusions Risks exist where we may not expect them –Five-nines mentality –Virtualization –Network disruption devices: duh! –Security Maybe we shouldn’t assume that the system can be made fully reliable (Travis)

Conclusions Need to recognize trade-offs: In complex systems, “win-win scenarios” are very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very, very RARE!

Conclusion to the Conclusions