Scalable Management for Networks and Services Rolf Stadler Laboratory for Communication Networks KTH Royal Institute of Technology Stockholm HP Laboratories,

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Policy-based Congestion Management for an SMS Gateway Alberto Gonzalez (KTH) Roberto Cosenza (Infoflex) Rolf Stadler (KTH) June 8, 2004, Policy Workshop.
Chapter 9 Introduction to MAN and WAN
QoS Routing for MPLS Networks Employing Mobile Agents By: Sergio Gonzalez-Valenzuela and Victor C. M. Leung Presented by: Nathan Balon.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
What is “Routing”? Routing algorithm that part of the network layer responsible for deciding on which output line to transmit an incoming packet Adaptive.
Small-world Overlay P2P Network
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Traffic Engineering With Traditional IP Routing Protocols
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
SANS A Simple Ad hoc Network Simulator Nicolas Burri Roger Wattenhofer Yves Weber Aaron Zollinger.
OSD Metadata Management
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 Lecture 24: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Sections 8.1 – 8.5)
The new The new MONARC Simulation Framework Iosif Legrand  California Institute of Technology.
Routing.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Network Topologies.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
Management by Network Search
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Introduction to Routing and Routing Protocols By Ashar Anwar.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Stainov - DataComMET CS TC5353 THE NETWORK LAYER 5.2 ROUTING ALGORITHMS - adaptive Distance Vector Routing (Bellman-Ford, Ford-Fulkenson). It was used.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Computer Simulation of Networks ECE/CSC 777: Telecommunications Network Design Fall, 2013, Rudra Dutta.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
Bandwidth Balancing in Multi- Channel IEEE Wireless Mesh networks Claudio Cicconetti, Ian F. Akyildiz School of Electrical and Computer Engineering.
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
NCLAB 1 Supporting complex queries in a distributed manner without using DHT NodeWiz: Peer-to-Peer Resource Discovery for Grids Sujoy Basu, Sujata Banerjee,
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
By Nitin Bahadur Gokul Nadathur Department of Computer Sciences University of Wisconsin-Madison Spring 2000.
7.1 The Network Layer It provides services to the transport layer. It is concerned with getting packets from the source to the destination, possibly making.
Distance Vector Routing
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1587: COMMUNICATION SYSTEMS 1 Wide Area Networks Dr. George Loukas University of Greenwich,
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Network Processing Systems Design
William Stallings Data and Computer Communications
Architecture and Algorithms for an IEEE 802
CS 457 – Lecture 12 Routing Spring 2012.
Introduction to Internet Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
Presentation transcript:

Scalable Management for Networks and Services Rolf Stadler Laboratory for Communication Networks KTH Royal Institute of Technology Stockholm HP Laboratories, Palo Alto, March 31, 2003

node Management station Management station Manager-Agent based management node AAA M results download & execute P Management Program Manager Agent Centralized Control Management protocols: SNMP, CMIP Program runs on Management Station Decentralized Control Program runs on network nodes P The Shift of a Management Paradigm A P A A

Router Execution Environment Management station Management Program navigation Code Server Architecture for Pattern-based Management

Weaver—A Testbed for pattern-based Management WAN A WAN B WAN C WAN D Management Station Router ARouter BRouter CRouter D FastEthernet Switch

Simple Navigation Patterns

Echo Pattern (expansion)

d root =1 Echo Pattern (expansion)

d root =2 Echo Pattern (expansion)

d root =3 Echo Pattern (expansion)

d root =4 Echo Pattern (expansion)

Echo Pattern d root =5

d root =4 Echo Pattern (contraction)

d root =3 Echo Pattern (contraction)

d root =2 Echo Pattern (contraction)

d root =1 Echo Pattern (contraction)

The Echo Pattern Two phases of traversal –expansion phase: explorers flood network with requests for local operations –contraction phase: echoes return and aggregate results Properties –Generates balanced traffic load –Traffic load depends on network topology, not on speed of traversal –Time complexity increases linearly with network diameter.

Examples of Echo-based Management Get information on topology –compute the current number of leaf nodes, the connectivity distribution –discover current topology within 10 hops of node x Get information on network state –identify 10 most congested links –compute distribution of link utilization, queue lengths –identify sub topologies with highly loaded links –find a resource R closest to node x

Pattern-based Management— An Engineering Approach to Decentralized Management A management program consists of –A navigation pattern (distr. graph traversal algorithm) –An operation on nodes –An aggregation function Relevance of this approach –Provides a basis to analyze management operation for performance, scalability, robustness –Supports concept of re-usable patterns, hides complexity

Composing Management Programs Segall Echo Patterns Navigation Patterns Chang Skip WaitScopeMulti Echo Aggregators Res. Disc. Aggregators Leaf Count Load. Hist. Conn. Hist. CLIHTTP XML SNMP Local Operations Node Access Management Program

Properties of Patterns Echo Aggregators Res. Disc. Aggregators Leaf CountLoad. Hist.Conn. Hist. CLIHTTP XML SNMP Node Access Management Program Segall Simple Echo Robust EchoOthers Echo Patterns Navigation Patterns Chang Skip Wait Scope Multi A pattern can be used for many management operations. A pattern can be chosen according to performance objectives. A pattern hides the complexity of a distributed operation. Network failures can be handled within patterns. Code mobility can be controlled.

visited i : boolean init false; G i : set of integers init neighbors(); parent i : integer init -1; Echo(inmsg: bytes, from: integer) { G i := G i - from; if visited i = false { parent i := from; visited i := true; OnInitiate(inmsg, outmsg); if G i != empty dispatch(parent i, outmsg, i); } else OnAggregate(inmsg); if G i = empty { OnComplete(outmsg); if parent i >= 0 dispatch(parent i, outmsg, i); else OnTerminate(inmsg); } The Interface between Pattern and Aggregator OnBegin OnTerminate OnInitiate OnComplete OnAggregate … av_load i := av_load; … av_load := load(); n:=1; … av_load := (av_load*n + av_load j )/(n+1); n:=n+1; …

SIMPSON: A SIMple Pattern Simulator fOr Large Networks

Analyzing Management Operations Network Graph G=(V,E)Execution Graphs G’=(V’,E’) Centralized ManagementDistributed Management Star PatternEcho Pattern

Traffic Complexity of Management Operations Amount of traffic placed on the network during execution.

Time Complexity of Management Operations Time needed from invocation until completion of a operation.

Performing Echo-based Operations on the Entire Internet Purpose is illustrating the scalability of echo-based operations. What we needed: –Complexity analysis of pattern –Estimation of Internet topological properties diameter connectivity distribution number of nodes

Estimated Performance of Echo-based Operation on the Internet Assumptions: Process-level transmission time: 5ms Network delay per hop: 4ms Message size: 1KB Local operation: 500ms per execution Diameter of Internet: 34 hops

Active Node Manager Source Repository Binaries Repository Preprocessor Transport Access Point Execution Environment Management Operation Results Device Manager C++ Compiler Source, State SNMP sets Management commands Weaver Active Node Source code, Active node management Router Node State Local Program States Source, State Events SNMP gets/traps Source Code results Active Node Engine Management Station

Suboperations in Weaver Node ANode B start Execution (T1) Serialization (T2) Dispatch (T3) Receiving (T4) Loading (T5) or Instantiation (T6) De-serialization (T7) Execution (T1) Serialization (T2) Dispatch (T3) Receiving (T4) Resolving (T8) end Time De-serialization (T7) Execution (T1) T C1 T C2

Measuring Execution Times on Weaver Duration in msPerformed by Module Execution (T1)1.57 (σ = 0.48)Execution Environment Serialization (T2)3.46 (σ = 0.71)Execution Environment Dispatch (T3)1.67 (σ = 0.49)Transport Access Point Receiving (T4)0.62 (σ = 0.30)Transport Access Point Loading (T5)23.42 (σ = 0.70)Execution Environment Instantiation (T6)0.77 (σ = 0.015)Execution Environment De-serialization (T7)2.04 (σ = 0.49)Execution Environment Resolving (T8)0.15 (σ = 0.001)Execution Environment Communications Delay (T C )4.04 (σ = 0.10)---

Estimating Execution Times of Echo-based Operations on Weaver

Skip Echo SkipEcho(inmsg: bytes from: integer) { if visited i = false { parent i := from; visited i := true; OnInitiate(inmsg, outmsg, i); G i = up_neighbors() - from; if G i != empty dispatch(parent i, outmsg, i); } else { G i = G i - from; OnAggregate(inmsg); } if complete i != true and G i = empty { OnComplete(outmsg); completed i := true; if parent i >= 0 dispatch(parent i, outmsg, i); else OnTerminate(inmsg); } alarm(type: {failure, recovery}, affected: integer){ if visited i = true { if type = failure { G i := G i - affected if complete i != true and G i = empty { complete i := true; OnComplete(outmsg); if parent i >= 0 dispatch(parent i, outmsg, i); else OnTerminate(inmsg); } Wait Echo SkipEcho(inmsg: bytes from: integer) { if visited i = false { parent i := from; visited i := true; OnInitiate(inmsg, outmsg, i); G i = up_neighbors() - from; if G i != empty dispatch(parent i, outmsg, i); } else { G i = G i - from; OnAggregate(inmsg); } if complete i != true and G i = empty { OnComplete(outmsg); completed i := true; if parent i >= 0 dispatch(parent i, outmsg, i); else OnTerminate(inmsg); } alarm(type: {failure, recovery}, affected: integer){ if visited i = true { if type == failure { G i = G i - affected B i = B i + affected if complete i != true and G i = empty { complete i := true; OnComplete(outmsg); if parent i >= 0 dispatch(parent i, outmsg, i) else OnTerminate(inmsg); } } else { if affected is in B i { B i = B i - affected G i = G i + affected } Designing Robust Patterns Plain Echo Echo(inmsg: bytes, from: integer) { Gi := Gi - from; if visitedi = false { parenti := from; visitedi := true; OnInitiate(inmsg, outmsg); if Gi != empty dispatch(parenti, outmsg, i); } else OnAggregate(inmsg); if Gi = empty { OnComplete(outmsg); if parenti >= 0 dispatch(parenti, outmsg, i); else OnTerminate(inmsg); }

Network Coverage vs. Execution Time for Skip Echo MTTR=1 min MTTR=11 min MTTR  0 MTTR  inf MTTF = 3.6 hrs MTTF = 7.3 hrs MTTF = 11.0 hrs MTTF = 14.7 hrs MTTF = 29.4 hrs MTTF = 73.6 hrs

Current and Planned Work Self-organizing, adaptable Networks and Systems: Patterns for routing and dynamic construction of network control structures. (Constantin Adam) WQL: A table-based Network Query Language on Weaver. (Koon-Seng Lim) Policy-based Management: Patterns for distribution and dynamic re-computation of policies. (Alberto Gonzalez)

Literature on this Work K.S. Lim, R. Stadler: “Weaver—Realizing a scalable management paradigm on commodity routers,” Eighth IFIP/IEEE International Symposium on Integrated Network Management (IM 2003), Colorado Springs, Colorado, USA, March 24-28, 2003.Weaver—Realizing a scalable management paradigm on commodity routers K.S. Lim and R. Stadler: "Developing pattern-based management programs," IFIP/IEEE International Conference on Management of Multimedia Networks and Services (MMNS 2001), Chicago, IL, October 29 - November 1, 2001.Developing pattern-based management programs K.S. Lim and R. Stadler: "A navigation pattern for scalable Internet management,"IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), Seattle,Washington, May, 2001.A navigation pattern for scalable Internet management R. Kawamura and R. Stadler: "A middleware architecture for active distributed management of IP networks, "IEEE/IFIP Network Operations and Management Symposium (NOMS 2000), Honolulu, Hawaii, April 10-14, 2000.A middleware architecture for active distributed management of IP networks