Griffin Update: Toward an Agile, Predictive Infrastructure Anthony D. Joseph UC Berkeley Sahara Retreat, January 2004.

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Perspective on Overlay Networks Panel: Challenges of Computing on a Massive Scale Ben Y. Zhao FuDiCo 2002.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Jennifer Rexford Princeton University MW 11:00am-12:20pm Network Virtualization COS 597E: Software Defined Networking.
This work was supported by the TRUST Center (NSF award number CCF ) 1. Setting up experiment on DETER testbed a)Created twelve pc backbone nodes.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Griffin Final Report DETER Testbed Update Anthony D. Joseph UC Berkeley Sahara Retreat, June 2004.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
APOHN: Subnetwork Layering to Improve TCP Performance over Heterogeneous Paths April 4, 2006 Dzmitry Kliazovich, Fabrizio Granelli, University of Trento,
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Rev A8/8/021 ABC Networks
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy,
Griffin Update: Towards an Agile, Predictive Infrastructure Anthony D. Joseph UC Berkeley Sahara Retreat, January 2003.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
Griffin Update: Toward an Agile, Predictive Infrastructure Anthony D. Joseph UC Berkeley Sahara Retreat, June 2003.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Griffin: Towards an Agile, Predictive Infrastructure Anthony D. Joseph Sahara Retreat June 10, 2002.
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Tentative Updates in MINO Steven Czerwinski Jeff Pang Anthony Joseph John Kubiatowicz ROC Winter Retreat January 13, 2002.
TAPAS: A Research Paradigm for the Modeling, Prediction and Analysis of Non-stationary Network Behavior Almudena Konrad PhD Candidate at UC Berkeley
OceanStore: An Architecture for Global-Scale Persistent Storage Professor John Kubiatowicz, University of California at Berkeley
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
OceanStore/Tapestry Toward Global-Scale, Self-Repairing, Secure and Persistent Storage Anthony D. Joseph John Kubiatowicz Sahara Retreat, January 2003.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Choosing an Accurate Network Model using Domain Analysis Almudena Konrad, Mills College Ben Y. Zhao, UC Santa Barbara Anthony Joseph, UC Berkeley The First.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Principles for Collaboration Systems Geoffrey Fox Community Grids Laboratory Indiana University Bloomington IN 47404
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Sponsored by the National Science Foundation A Virtual Computer Networking Lab Mike Zink, Max Ott, Jeannie Albrecht GEC 23, June 16 th 2015.
Dynamic Network Emulation Security Analysis for Application Layer Protocols.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Common Devices Used In Computer Networks
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Wide-Area Service Composition: Performance, Availability and Scalability Bhaskaran Raman SAHARA, EECS, U.C.Berkeley Presentation at Ericsson, Jan 2002.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Multimedia & Mobile Communications Lab.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Internet Measurement and Analysis Vinay Ribeiro Shriram Sarvotham Rolf Riedi Richard Baraniuk Rice University.
Characteristics of Scaleable Internetworks
OOD OO Design. OOD-2 OO Development Requirements Use case analysis OO Analysis –Models from the domain and application OO Design –Mapping of model.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Introduction to Avaya’s SDN Architecture February 2015.
Session 1: Technology Development August 15 NSF Workshop.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Kris, Karthik, Ansley, Sean, Jeremy Dick, David K, Frans, Hari
Unit 27: Network Operating Systems
TRUST:Team for Research in Ubiquitous Secure Technologies
File Transfer Issues with TCP Acceleration with FileCatalyst
Intelligent Network Services through Active Flow Manipulation
Presentation transcript:

Griffin Update: Toward an Agile, Predictive Infrastructure Anthony D. Joseph UC Berkeley Sahara Retreat, January 2004 DE T ER

2 Outline Griffin – Motivation – Goals – Components Tapas Update Tapestry Update REAP/MINO Update Beyond Griffin: DETER

3 Near-Continuous, Highly-Variable Internet Connectivity Connectivity everywhere: campus, in-building, satellite… – Projects: Sahara (01-04), Iceberg (98-01), Rover (95-97) Most applications support limited variability (1% to 2x) – Design environment for legacy apps is static desktop LAN – Strong abstraction boundaries (APIs) hide the # of RPCs But, today’s apps see a wider range of variability – 3  5 orders of magnitude of bandwidth from 10's Kb/s  1 Gb/s – 4  6 orders of magnitude of latency from 1  sec  1,000's ms – 5  9 orders of magnitude of loss rates from  BER – Neither best-effort or unbounded retransmission may be ideal – Also, overloaded servers / limited resources on mobile devices Result: Poor/variable performance from legacy apps

4 Griffin Goals Users always see excellent (  local, lightly loaded) application behavior and performance – Independent of the current infrastructure conditions – Move away from “reactive to change” model – Agility: key metric is time to react and adapt Help legacy applications handle changing conditions – Analyze, classify, and predict behavior – Pre-stage dynamic/static code/data (activate on demand) Architecture for developing new applications – Input/control mechanisms for new applications – Application developer tools

5 Griffin: An Adaptive, Predictive Approach Continuous, cross-layer, multi-timescale introspection – Collect & cluster link, network, and application protocol events – Broader-scale: Correlate AND communicate short-/long-term events and effects at multiple levels (breaks abstractions) – SOLVED: Building accurate models of correlated events Convey app reqs/network info to/from lower-levels – Break abstraction boundaries in a controlled way – OPEN: Extensible interfaces to avoid existing least common denominator problems Overlay more powerful network model on top of IP – Avoid standardization delays/inertia – Enables dynamic service placement – PARTIAL: Efficient interoperation with IP routing policies

6 Some Enabling Infrastructure Components Tapas network characteristics toolkit – Measuring/modeling/emulating/predicting delay, loss, … – Provides micro-scale network weather information – Mechanism for monitoring/predicting available QoS REAP protocol modifying / application building toolkit – Introspective mobile code/data support for legacy / new apps – Provides dynamic placement of data and service components – MINO application, COMPASS service instance locator Tapestry, Brocade, and Mobile Tapestry – Overlay routing layer providing efficient application-level object location and routing – Mobility support, fault-tolerance, varying delivery semantics

7 Outline Griffin – Motivation – Goals – Components Tapas Update Tapestry Update REAP/MINO Update Beyond Griffin: DETER

8 Tapas Update Accurate modeling and emulation for protocol design – Models/artificial traces that are statistically indistinguishable from real network traces: delay, error, congestion – Study interactions between protocols at different levels Project completed ( ) – Multitracer trace analysis tool – Two highly-accurate network models (MTA, M3) – Domain analysis tool – Highly-accurate Tapas-based link simulator PhD dissertation – Almudena Konrad, “TAPAS: A Research Paradigm for the Modeling, Prediction, and Analysis of Non-stationary Network Behavior,” (Ph.D., December 2003)

9 Tapestry Update Distributed Object Location and Routing (DOLR) overlay network Improved static resilience (talk tomorrow) – Pre-computed backup paths enable near- instantaneous fail-over (3 paths/router entry) – Better dynamic resilience through improved repair algorithms to handle long-term faults – IEEE JSAC article pending Support for rapid, hierarchical mobility – Scaleable mobility for large crowds traveling together – IPTPS paper in submission

10 Tapestry Static Resilience (Sim)

11 REAP/MINO/COMPASS Update Introspective code / data migration in 3-tier hierarchies – Distributes server load, empowers limited devices – Provides illusion of high connectivity Combines static trace analysis w/ dynamic monitoring of clients to predict appl’n / communication behavior – Identify and optimize code/data placement – Analyzing EECS IMAP server traces for user session length and inter-session mobility (see poster) Testbed technologies: – REAP code migration toolkit – MINO OceanStore application – COMPASS: service instance location service (talk tomorrow)

12 User IMAP Session Lengths (processed to remove auto checks)

13 Outline Griffin – Motivation – Goals – Components Tapas Update Tapestry Update REAP/MINO Update Beyond Griffin: DETER

14 Cyber DEfense Technology Experimental Research (DETER) NSF and DHS sponsored cyber-defense research project – Approx $10M total ($2.4 for UCB) DETER Goals: – Design and construction of a testbed for network security experiments, – Research on experimental methodology for network security, and – Research on network security. DETER: focus on 1), but it needs to do some of 2) and 3) Goal: Duplicate observed attack effects in the testbed – E.g., self-congestion for worms DE T ER

15 Related Goals Vendor-heterogeneous environment – Reflects real-world, implementation interactions – Open source versus commercial code (e.g., timers) – Behavior under load/attack Create a researcher’s electronic notebook – Network topologies, attack traces and generators – Background traffic traces and generators Many requirements (some conflicting!) – Versatility, Controllability, Accessibility, Usability – Functionality, Transparency, Fairness, Containment – Security, Fidelity, Integrity DE T ER

16 Background People: – Anthony Joseph, Ruzena Bajcsy, Shankar Sastry, David Culler, Doug Tygar, David Wagner, Eric Fraser (staff), Yih- Chun Hu (postdoc) – Small initial user community (usability versus containment) Hardware – First cluster of ~64 PCs at USC/ISI West (Jan/Feb 04) – Second cluster at UCB (Mar/Apr 04) Similar to ISI cluster, but with more hw routers Three experiment areas (EMIST) – Worms, routing attacks, DDoS attacks Major demo of experimental results in DC in June 04 – Future: DHS, HSARPA, and White House “exercises” – E.g., LiveWire, DarkScreen, JWIG2004 DE T ER

17 Preliminary UCB Architecture Proposal DE T ER

18 Some Collaboration Opportunities Research opportunities – Measuring application behavior under attack Web servers, file servers, etc. – Strategies for mitigating attacks Worm defenses, DDoS traceback and block, hardening routing protocols – Operations and management Substantial knowledgebase from commercial customers (Tiger teams) Donations – VIFs: Cluster or security experience/research – Remote administration tools, remote SW installation setup tools – Nodes, Firewall machines, L2/L3 routers, HW sniffers, etc DE T ER

Griffin Update: Toward an Agile, Predictive Infrastructure Anthony D. Joseph UC Berkeley Sahara Retreat, January 2004 DE T ER