Home
Towards Improved Control and Troubleshooting for
Contents
1. 00 70 Mirroring performance Boxplot of forwarded packets second 71 Overview of OFRewind m mm none 78 Overview of Traffic strata 2 2 2 Co oo oo 78 DataStore synchronization mechanism in OFRewind 87 Overview of the lab environment for case studies 91 Sawtooth CPU pattern case study messages and switch performance d ring replay s so a sandy a a ae malen 92 Broadcast storm case study Time series of CPU utilization 93 Invalid port translation case study Schematic overview 95 Faulty route advertisements case study Setup 97 Controller performance median flow rates for different controllers 99 Switch performance Forwarded flow rates by different switches and Controllers apilar Sere hc he a EE 101 End to end flow timing accuracy boxplot of the relative deviation from expected inter flow delay o o 102 2 1 2 2 3 1 5 1 6 1 6 2 6 3 6 4 6 5 List of Tables Overview of popular OpenFlow controllers 20 Overview of popular OpenFlow switch implementations 21 Flow Routing experiments overview Mean and median benefits 34 QoE case study experiment outline across phases 68 Ofreplay operation modes 2 22 2 2m mn a 82 Overview of the case studies 2 2 2 2 Cm m on 90 Anomalous forwarding case study flow table entries during replay 94 Evaluation Overview of controllers used 2
2. Anagran http www anagran com ANAND A AND AKELLA A Netreplay a new network primitive In Proc HOT METRICS 2009 ANDERSON E AND ARLITT M Full Packet Capture and Offline Analysis on 1 and 10 Gb s Networks Tech Rep HPL 2006 156 HP Labs 2006 ANDERSON T PETERSON L SHENKER S AND TURNER J Overcoming the internet impasse through virtualization IEEE Computer Magazine 38 4 2005 ANTONELLI C Co K M FIELDS AND HONEYMAN P Cryptographic Wiretapping at 100 Megabits In 16th International Symposium on Aerospace Defense Sensing Simulation and Controls SPIE 2002 ANWER M B NAYAK A FEAMSTER N AND Liu L Network I O fairness in virtual machines In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures VISA 2010 pp 73 80 BAGNULO M AND NORDMARK E Shim6 Level 3 Multihoming Shim Protocol for IPv6 RFC 5533 Standards track 2009 BAHL P CHANDRA R GREENBERG A KANDULA S MALTZ D A AND ZHANG M Towards highly reliable enterprise network services via inference of multi level dependencies In Proceedings of ACM SIGCOMM conference on Data communi cation New York NY USA 2007 SIGCOMM 07 ACM pp 13 24 BALLARD J R RAE I AND AKELLA A Extensible and scalable network mon itoring using opensafe In Proceedings of the USENIX Internet Management Work shop Workshop on Research on Enterprise Networking INM WREN
3. Figure 6 5 shows our attempt at reproducing the CPU oscillation we reported in Section 6 As stated earlier there is no apparent correlation between the ingress trafic and the CPU utilization We record all control traffic in the production net work as well as the traffic entering exiting the switch while the CPU oscillation is happening Figure 6 5 a shows the original switch performance during recording We then iteratively replay the corresponding control traffic over a similar switch in our isolated experimental setup We replay the recorded data traffic to 1 port of the switch and connect hosts that send ICMP datagrams to the other ports In each iteration we have Ofreplay bisect the trace by OpenFlow message type and check whether the symptom persists When replaying the port and table statistic requests we observe the behavior as shown in Figure 6 5 b Since the data traffic is synthetically generated the amplitude of the CPU oscillation and the flow setup time variation is different from that in the original system Still the sawtooth pattern is clearly visible This successful reproduction of the symptom helps us identify the is sue to be related to port and table statistics requests Note that these messages have been causing the anomaly even though their arrival rate 24 messages per minute is not in any way temporally correlated with the perceived symptoms 30 minute CPU sawtooth pattern We reported this issue to the vendor
4. BARB C AND JOGLEKAR A An integrated experimental environ ment for distributed systems and networks In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation OSDI 125 Bibliography 157 158 159 160 161 126 WUNDSAM A Connection sharing in community networks how to accomodate peak bandwidth demands Diplomarbeit TU Munich Germany Apr 2007 YAN H Martz D A NG T S E GOGINENI H ZHANG H AND CAI Z Tesseract A 4D network control plane In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2007 YEow W L WESTPHAL C AND KOZAT U Designing and embedding reliable virtual infrastructures In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures VISA 2010 pp 33 40 Yu M YI Y REXFORD J AND CHIANG M Rethinking virtual network embed ding substrate support for path splitting and migration ACM SIGCOMM Computer Communication Review CCR 38 March 2008 17 29 ZHU Y ZHANG SHEN R RANGARAJAN S AND REXFORD J Cabernet Con nectivity architecture for better network services In Proceedings of the ACM Re Architecting the Internet Workshop ReArch 2008
5. LE Roux J L AND MILES J Interprovider IP MPLS services 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 120 requirements implementations and challenges IEEE Communication Magazine 43 6 june 2005 119 128 FEAMSTER N AND BALAKRISHNAN H Detecting bgp configuration faults with static analysis In Proceedings of the USENIX Symposium on Networked Systems De sign and Implementation NSDI Berkeley CA USA 2005 USENIX Association pp 43 56 FEAMSTER N GAO L AND REXFORD J How to Lease the Internet in Your Spare Time ACM SIGCOMM Computer Communication Review CCR 37 1 2007 61 64 FELDMANN A Internet clean slate design What and why ACM SIGCOMM Com puter Communication Review CCR 87 3 2007 59 64 FELDMANN A KIND M MAENNEL O SCHAFFRATH G AND WERLE C Net work Virtualization An Enabler for Overcoming Ossification ERCIM News 77 April 2009 21 23 FIELD T Facebook revolution Hold the hyperbole http www thespec com opinion article 510112 2011 FONSECA R PORTER G KATZ R H SHENKER S AND STOICA I X trace A pervasive network tracing framework In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2007 GEELS D ALTEKAR G MANIATIS P ROSCOE T AND STOICA I Friday Global comprehension for distributed replay In Proceedings of the USENIX Symposium on
6. TECHNISCHE UNIVERSITAT BERLIN FAKULTAT FUR ELEKTROTECHNIK UND INFORMATIK LEHRSTUHL FUR INTELLIGENTE NETZE UND MANAGEMENT VERTEILTER SYSTEME Towards Improved Control and Troubleshooting for Operational Networks vorgelegt von Andreas Wundsam Dipl Inf von der Fakultat IV Elektrotechnik und Informatik der Technischen Universitat Berlin zur Erlangung des akademischen Grades DOKTOR DER INGENIEURWISSENSCHAFTEN DR ING genehmigte Dissertation Promotionsausschuss Vorsitzender Prof Dr Jean Pierre Seifert TU Berlin Gutachterin Prof Anja Feldmann Ph D TU Berlin Gutachter Prof Dr Laurent Mathy Lancaster University UK Gutachter Dr Olaf Maennel Loughborough University UK Tag der wissenschaftlichen Aussprache 15 Juli 2011 Berlin 2011 D83 Ich versichere an Eides statt dass ich diese Dissertation selbst ndig verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe Datum Andreas Wundsam Abstract Over the past decade operational networks have grown tremendously in size per formance and importance This concerns particularly the Internet the ultimate network of networks We expect this trend to continue as more and more services traditionally provided by the local computer move to the cloud e g file storage services and office applications In spite of this our ability to control and manage these networks remains painfully inadequate and our visibility into the network l
7. uration files and automatic bootstrapping of experiment nodes Initially Emulab focused on dedicated servers Virtualization capabilities based on improved FreeBSD jails were added later GENI GENI 70 is a large scale U S initiative for building a federated virtualized testbed aiming at providing a powerful virtualized testbed for experimental purposes Here all operations are signed off and managed by a central Geni Clearing House As a possible growth path GENI plans on supporting federated clearing houses During the first phases of the development both VINI PlanetLab and Emulab have been used as GENI prototypes All testbed oriented architectures mentioned above do not consider several key fac tors relevant for virtualizing the commercial Internet They assume a hierarchical trust model that centers on a universally trusted entity e g the PLC GENI clear inghouses 2 1 4 VNet Proposals for Production Networks We now discuss existing proposals for Production Networks and the commercial In ternet as a whole CABO 63 proposes to speed up deployment of new protocols by allowing multiple concurrent virtualized networks in parallel To this end infrastructure providers manage the substrate resources while service providers operate their own customized network inside of allocated slices of these networks 14 2 1 Virtual Networks This idea in refined by Cabernet 161 which introduces a Connectivity Layer be
8. 99 of the observed bugs 22 Data plane traffic can be load balanced across multiple data plane recorders This enables recording even in environments with high data rates Finally thanks to the centralized perspective of the controller OF Rewind can record a temporally consistent trace of the controller domain This facilitates in vestigation of the temporal and causal interdependencies of the messages exchanged between the devices in the controller domain During replay OF Rewind enables the operator to select which parts of the traces are to be replayed and how they should be mapped to the replay environment By partitioning or bisecting the trace and automatically repeating the experiment our tool helps to narrow down and isolate the problem causing component or traffic A concrete implementation of the tool based on OpenFlow is presented in Section 6 2 and is released as free and open source software 8 Our work is primarily motivated by operational issues in the OpenFlow enabled pro duction network at Stanford University Accordingly we discuss several case studies where our system has proven useful including switch CPU inflation broadcast storms anomalous forwarding NOX packet parsing errors and other invalid con troller actions Section 6 3 We in addition present a case study in which OF Rewind successfully pinpoints faulty behavior in the Quagga RIP software routing daemon This indicates that OF Rewind is not limited t
9. Che and Kalle who shared a similar fate of having to make do with whatever slots my work and travel schedules would leave open Singing is an incredible hobby a good song is a perfect shortcut to happiness and the world would be a better place if more people did it Lastly the most important thank you goes to my family especially to my parents who always backed and supported me in the meandering paths between education business and finally science I have chosen for myself This is where I am now Let s see how the path continues even a researcher life in spite of what the rumors say 3Well and maybe a few people stopped 112 2 1 2 2 2 3 2 4 3 1 3 2 3 3 3 4 3 5 3 6 3 7 3 8 3 9 3 10 3 11 4 1 4 2 4 3 5 1 5 2 5 3 5 4 9 9 5 6 List of Figures Comparison of schematic switch architectures with and without Open Flow io ae A A Ad Sas AO ee Dee 18 Example of a message exchange in an OpenFlow enabled network 19 Schematic Network Layout of the FG INET Routerlab 22 Schematic network layout of the Los Altos Testbed 24 Example of a community network with Flow Routing 28 Components of a Flow Routing system with OpenFlow 29 Comparison simulator vs testbed Normalized link utilization direct o see ea sh RR Gog ered ang as 31 Surge Experiment CCDF of flow durations with and without Flow ROMINA ss 2 a les ey ad Aon an A ak a Glee ee A 33 S
10. and flows classified These range from Layer 1 switch ports to Layer 2 and 3 MAC and IP addresses to Layer 4 TCP and UDP ports The set of matching rules and the actions associated with and performed on each match are held in the switch and known as the flow table We next discuss the implementation of OFRewind the synchronization among the components and discuss the benefits limitations and best practices of using OpenFlow to implement our system The implementation which is an OpenFlow controller in itself and based on the source code of FlowVisor 136 is available under a free and open source license at 8 6 2 1 Software Modules To capture both the substrate control traffic and guest network traffic we use a hybrid strategy for implementing OFRewind Reconsider the example shown in Figure 6 1 a from an OpenFlow perspective We deploy a proxy server in the Open Flow protocol path labeled OFRewind and attach local DataStore nodes to the switches The OFRewind node runs the Ofrecord and Ofreplay modules and the DataStore nodes run Datarecord and Datareplay respectively We now discuss the implementation of the four software components Ofrecord Datarecord Ofreplay and Datareplay Ofrecord Ofrecord intercepts all messages passing between the switches and con troller and applies the selection rules It then stores the selected OpenFlow control substrate messages to locally attached data storage Optionally the entire f
11. multihoming load balancing system In Proceedings of the IEEE Annual International Conference on Computer Communications INFOCOM 2004 GUPTA D VISHWANATH K AND VAHDAT A Diecast Testing distributed systems with an accurate scale model In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2008 GUPTA D Yocum K MCNETT M SNOEREN A C VAHDAT A AND VOELKER G M To infinity and beyond Time warped network emulation In Pro ceedings of the ACM Symposium on Operating Systems Principles SOSP 2005 HABIB A CHRISTIN A AND CHUANG J Taking Advantage of Multihoming with Session Layer Striping In IEEE Global Internet 2006 HICKEY A R Juniper opens os to third party developers tak ing stab at cisco http www crn com news networking 204800583 juniper opens os to third party developers taking stab at cisco htm Hower D R MONTESINOS P CEZE L HILL M D AND TORRELLAS J Two hardware based approaches for deterministic multiprocessor replay Communications ofthe ACM 52 6 2009 93 100 HSIEH H Y AND SIVAKUMAR R A transport layer approach for achieving aggre gate bandwidths on multi homed mobile hosts In Proceedings of the ACM Annual International Conference on Mobile Computing and Networking MobiCom 2002 Intel Virtualization Technology Hardware support for efficient processor vir tualization http www intel com technology itj 2006 v10i3
12. or debugging can be safely attempted in the isolated Mirror VNet without affecting the end users that interact with the production VNet Only when a change has been verified to work the VNets are switched semi atomically We present and investigate the approach a prototype system built on OpenFlow and XEN and discuss a case study in a multimedia QoE scenario We then explore how flow oriented architectures can be leveraged to enable replay debugging in Networks and present and evaluate OF Rewind the first system to en able practical replay troubleshooting in Operational networks with black box compo nents based on commodity hardware OFRewind acts as a proxy in the OpenFlow controller chain and enables consistent recording of traffic in a network domain Control plane traffic is always recorded due to its low bitrates and high relevance for troubleshooting Dataplane traffic is selectively recorded and can be load balanced over multiple DataStores to keep hardware requirements within commodity bounds The recordings can then be replayed back onto the network in coordinated fashion with adjustable pace to investigate problem causes We present several case studies where our tool has been instrumental in debugging practical network problems and demonstrate it has adequate scalability and low enough overhead for practical use Chapter 1 Introduction 1 5 Our Contribution Our contributions span a wide area in understanding and improving
13. sesCasess ieee hs a Goes Qa uo gee Boe is a Dede ig ee 63 Hela DISCUSSION Sn rt da oe Gee tse da ces pbs gant fine hee A eee aeg 63 5 2 Prototype Implementation 0 000000 eee 64 9 3 Mase Study La Bears AE fa a ic G 66 8 3 1 Experiment Metrics aasa 67 5 3 2 Experiment Outline 67 53 39 Results 2 ee Dan a ahd A a a e 68 5 4 Mirroring Performance 0 00000 ee ee ee 69 574 1 Evaluation Setup ea a a haare 70 5 4 2 Forwarding Results 2 222 Co oo nn nn 70 5 5 Related Work ci ose Sey gs RE nee 72 5 6 Summary and Future Work 22 2 Common 72 OFRewind Enabling Record and Replay Troubleshooting for Networks 74 6 1 OFRewind System Design 2 22 22 2 on nn nn 77 6 1 1 Environment Abstractions 4 22 8 2 64 4 ba man ees 79 6 1 2 Design Goals and Non goals 2 2 2 2 nn nn 79 6 1 3 OFRewind System Components 80 xi Contents 6 1 4 Ofrecord Traffic Selection 2 22 2 2m nn 81 6 1 5 Ofreplay Operation Modes 2004 81 6 1 6 Event Ordering and Synchronization 83 6 1 7 Typical Operation o 84 6 1 8 Online Oireplay aia da nee una 84 6 2 1 Implementation rn 6 Eo hed Oe BS oe BR ee 85 6 2 1 Software Modules 2 Comm eee eee ee 85 6 2 2 Synchronization soto Be er a ae a a 86 6 2 3 DISCUSSION Ys ata Gros ol a Pc Rete Bah ae eS 89 6 3 Case Studies aa alan a Sow i ae A ee ae
14. w g gt jo LZ oo a i S gt O Y y n _ i a A direct routed Figure 3 4 Surge Experiment MinLargeF lows strategy duration probability density 4 MinLargeFlows Direct 0 2 0 5 1 0 2 0 Duration s 5 0 10 0 20 0 CCDF of flow durations without vs with Flow Routing Figure 3 5 Surge Experiment PDF of flow durations without vs with Flow Routing Min LargeFlows strategy 33 Chapter 3 Augmenting Commodity Internet Access with Flow Routing Experiment Policy Mean Median Surge Ethernet NistNet MinLargeFlows 2 47 1 83 Surge Ethernet DSL MinLargeFlows 2 49 2 03 Surge Wlan NistNet MinLargeFlows 2 61 2 11 Surge Simulator MinLargeFlows 2 59 2 09 Surge Simulator FatPipe 2 79 2 24 1 3 MWN Ethernet NistNet MinLargeFlows 2 04 1 02 MWN Ethernet NistNet MinLargeFlows 3 02 1 98 MWN Simulator MinLargeFlows 2 47 1 99 MWN Simulator FatPipe 3 73 2 40 Table 3 1 Flow Routing experiments overview benefit for bulky flows gt 0 5 sec under different workloads and experimental settings for both simulator and testbed 3 3 1 Synthetic Web Workload We use Surge 34 to generate a synthetic workload that resembles Web traffic We update its configuration parameters to reflect characteristics of today s Web e g the median and mean HTTP object size of the current W
15. 1 hardware 6 vt x vt i solutions htm Internap http www internap con JUNIPER INC Control Plane Scaling and Router Virtualization www juniper net us en local pdf whitepapers 2000261 en pdf KELLER E Yu M CAESAR M AND REXFORD J Virtually eliminating router bugs In Proceedings of the ACM International Conference on emerging Networking EXperiments and Technologies CoNEXT 2009 Kim C CAESAR M AND REXFORD J Floodless in Seattle A scalable Ethernet architecture for large enterprises ACM SIGCOMM Computer Communication Review CCR 38 August 2008 3 14 KING S T DUNLAP G W AND CHEN P M Debugging operating system with time traveling virtual machines In Proceedings of the USENIX Annual Technical Conference USENIX ATC 2005 Kivity A KAMAy Y LAOR D LUBLIN U AND LIGUORI A KVM the Linux virtual machine monitor In Prooceedings of the Linux Symposium 2007 LAD M BHATTI S HAILES S AND KIRSTEIN P Coalition Based Peering for Flexible Connectivity In Proceedings of the Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communication PIMRC 2006 121 Bibliography 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 122 LAMPORT L Time clocks and the ordering of events in a distributed system Com munications of the ACM 21 7 1978 LIN C C CAESAR M AND VAN DER MER
16. 3 3 Results In phase 1 background traffic is running at low intensity In the middle of phase 2 the intensity of the Internet traffic is switched to high This causes a problem in VoIP quality as measured by the MoS value see Figure 5 6 The perceived quality drops from a MoS score of 4 34 which corresponds to a very satisfied service level drops to 4 16 which corresponds to a level of satisfied As such the VNet operator asks to instantiate a Mirror VNet at the beginning of phase 3 This means that all packets are now duplicated at node 1 and are routed in both VNets A and B However the end user for VoIP service is still getting service through VNet A This allows the operator to assess the impact of the degradation and to do root cause analysis in VNet B Indeed the quality of the call decreases 68 5 4 Mirroring Performance io N Leases gt par o Y ja x 9 N or 7 S lt A 27 N a Se ES F EN Y el N Fi 2 lt gt Receiver i VNETA _ X VNETB heed T T T T 1 2 3 4 5 6 Phase Figure 5 6 Mean MoS value per experiment phase as measured within VNets A B and at the end host receiver further in our experiment In our case the operator decides to prioritize VoIP traffic to counter the bad performance He enables QoS at the start of phase 4 Even though the background traffic increases further in this phase the QoS reduces the loss rates within VNet B significant
17. I i la le In the presence of flow creation markers it guarantees that the order between the marked flows will be preserved 6 1 7 Typical Operation We envision that users of OF Rewind run Ofrecord in an always on fashion always recording selected substrate control plane traffic e g OpenFlow messages onto a ring storage If necessary selected guest traffic can also be continuously recorded on Datarecord To preserve space low rate control plane traffic e g routing an nouncements may be selected sampling may be used and or the ring storage may be shrunk When the operator or an automated analytics tool detects an anomaly a replay is launched onto a separate set of hardware or onto the production network during off peak times Recording settings are adapted as necessary until the anomaly can be reproduced during replay During replay one typically uses some kind of debugging by elimination either by performing binary search along the time axis or by eliminating one kind of message at a time Hereby it is important to choose orthogonal subsets of messages for effective problem localization 6 1 8 Online Ofreplay In the online replay mode Ofrecord and Ofreplay are combined control messages are directly replayed upon arrival e g to a different set of hardware or to a different substrate slice Data traffic is also duplicated onto the second slice as required This is feasible as switches already offer flexible hardware
18. MANILICI V AND WUNDSAM A FlowSim a flow based network simulator http www net t labs tu berlin de vlad FlowRoutingSoftware 2008 MANSMANN U Beschwerdeflut Was bei DSL alles schiefgehen kann c t Magazin f r Computer Technik 9 2009 152 154 MCGRATH K P AND NELSON J Monitoring amp Forensic Analysis for Wireless Net works In Proceedings of the IEEE Conference on Internet Surveillance and Protection ICISP 2006 McKeown N ANDERSON T BALAKRISHNAN H PARULKAR G PETERSON L REXFORD J SHENKER S AND TURNER J OpenFlow enabling innovation in campus networks ACM SIGCOMM Computer Communication Review CCR 38 2 2008 MICHEEL J DONNELLY S AND GRAHAM I Precision timestamping of network packets In Proceedings of the ACM Internet Measurement Workshop IMW 2001 MONTESINOS P Hicks M KING S T AND TORRELLAS J Capo a software hardware interface for practical deterministic multiprocessor replay In Proceedings of the ACM International Conference on Architectural Support for Programming Lan guages and Operating Systems ASPLOS 2009 pp 73 84 Bibliography 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 Mushroom Networks http www mushroomnetworks com NICHOLS K BLAKE S BAKER F AND BLACK D Definition of the differentiated services field ds field in the ipv4 and ipv
19. Network Virtualization with their competitor TeliaSonera 100 This caused reachability and performance problems for end users routed via Cogent to services hosted by TeliaSonera e g the European servers of the popular online game World Of Warcraft Yet neither the company offering the service Blizzard Entertainment nor most of the affected end customers were direct customers of Cogent This showcases that improving control and troubleshooting in this complex environ ment is as much an organizational economical and political challenge as a technical one The challenge is most prominently exemplified by Quality Of Service QoS It is widely believed that end to end QoS is required to guarantee good user ex perience for demanding applications Mechanisms have been researched proposed and standardized for more than a decade e g DiffServ cross provider MPLS Still these new enabling technologies fail to achieve traction across the majority of ISPs Consequently we believe that the greatest challenge is not in finding solutions and improvements to the Internet s many problems but in how to actually deploy those solutions and re balance the tussle between reliability and functionality Network virtualization provides a promising approach to enable the co existence of innovation and reliability The type of network virtualization needed is not to be confused with current technologies such as Virtual Private Networks VPNs which m
20. Networks Lastly we now turn to the far end of the communication path the server side edge of the Internet Increasingly services as our online web based spreadsheet example are provided in large cloud datacenters as operators seek to exploit economies of scale In many cases these data centers are virtualized and multi tenant and accommodate many customers at the same time Troubleshooting such operational networks can be a daunting task due to their size distributed state and the presence of black box components such as commercial routers and switches which are poorly instrumentable and only coarsely configurable The tool set available to administrators is limited and provides only aggregated statistics SNMP sampled data NetFlow sFlow or local measurements on single hosts tcpdump In this chapter we leverage split forwarding architectures such as OpenFlow to add record and replay debugging capabilities to networks a powerful yet currently lack ing approach We present the design of OF Rewind which enables scalable multi granularity temporally consistent recording and coordinated replay in a network with fine grained dynamic centrally orchestrated control over both record and replay Thus OF Rewind helps operators to reproduce software errors identify data path limitations or locate configuration errors Replay can be performed over parts of the control or data traffic over alternate hardware or ports and at a
21. Note that all controllers except nox pyswitch perform an order of magnitude better than the maximum flow rates supported by current prototype OpenFlow hardware implementations max 1 000 flows s 99 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks 6 4 2 Switch Performance During Record When Ofrecord runs in guest mode switches must handle an increase in Open Flow control plane messages due to the sync markers Additionally FLOW MOD and PACKET OUT messages contain additional actions for mirroring data to the DataStores This may influence the flow arrival rate that can be handled by a switch To investigate the impact of Ofrecord deployment on switch behavior we use a test setup with two 8 core servers with 8 interfaces each wired to two prototype OpenF low hardware switches from Vendor A and Vendor B We measure the supported flow arrival rates by generating minimum sized UDP packets with increasing destination port numbers in regular time intervals Each packet thus creates a new flow entry We record and count the packets at the sending and the receiving interfaces Each run lasts for 60 seconds then the UDP packet generation rate is increased Figure 6 10 presents the flow rates supported by the switches when controlled by ofrecord ofrecord data and of simple We observe that all combinations of controllers and switches handle flow arrival rates of at least 200 flows s For higher flow rates the Vend
22. Properties and Benefits Virtualization is an abstraction concept A resource being virtualized the substrate is being made available by a virtualization layer to virtualization guests In a general sense this concept encompasses the aspects of information hiding multiplexing iso lation and optionally transparency Its benefits include on demand provisioning and migration Information hiding Virtualization abstracts and hides details of the underlaying layers from the virtualized guests This can include e g the exact address in physical memory where information is stored Multiplexing Virtualization also typically encompasses an aspect of multiplexing A single underlying resource is made available and multiplexed between several clients For example this is true for preemptive CPU scheduling in operating sys tems 10 2 1 Virtual Networks Isolation Isolation is another important property that distinguishes virtualization from cooperative multiplexing A virtualized guest should not be able to interfere with the operation of other guests running on the same substrate nor must it interfere with the operation of the virtualization layer itself Examples for this property include preemptive process scheduling in Operating Systems where a process cannot avoid being unscheduled by the Operation System Scheduler There are different levels of isolation that can be provided Functional Isolation guarantees that there is no interfe
23. ZENG H APPENZELLER G JOHARI R MCKEOWN N AND PARULKAR G M Carv ing research slices out of your production networks with openflow ACM SIGCOMM Computer Communication Review CCR 2010 129 130 SHERWOOD R GIBB G YAP K K APPENZELLER G CASADO M McK EOWN N AND PARULKAR G Can the production network be the testbed In Proceedings of the USENIX Symposium on Operating Systems Design and Implemen tation OSDI 2010 pp 1 6 Private communication with a Small Bavarian Internet Provider TM SOMMERS J AND BARFORD P Self configuring network traffic generation In ACM IMC 2004 Bibliography 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 SOMMERS J BARFORD P DUFFIELD N AND RON A Improving accuracy in end to end packet loss measurement In Proceedings of ACM SIGCOMM conference on Data communication 2005 pp 157 168 Stanford University Clean Slate Lab http cleanslate stanford edu STEWART R Stream Control Transmission Protocol RFC 4960 Proposed Standard Sept 2007 STEWART R AND METZ C SCTP new transport protocol for TCP IP IEEE Internet Computing 2001 STONE B AND COHEN N Social networks spread defiance online New York Times June 16 2009 page All http www nytimes com 2009 06 16 world middleeast 16media html June 16 2009 Crossbow Network Virtualization
24. an Operating System for networks It is designed as an extensible event based controller framework The actual decision making is car ried out by custom modules applications which can be implemented in Python or C Based on a publisher subscriber model NOX monitors the network and informs the interested applications about relevant events e g appearing and disap pearing switches or received packets new flows Beacon Beacon 37 is a Java based OpenF low controller framework licensed under the Apache 2 0 license It is built as a set of OSGI components This allows the OpenFlow modules on the platform to be installed started or stopped at run time without disconnecting switches FlowVisor FlowVisor 135 136 is special purpose controller aimed at Network Vir tualization It acts as a proxy between several OpenFlow switches and controllers Logically the switch is partitioned into separate slices with each of the client con trollers being able to see and influence a part of the possible set of flow entries the so called flow space It aims at providing transparency and isolation between the slices In order to provide good isolation properties FlowVisor needs precise informa tion about the performance impact of individual flow commands e g whether a flow table entry will be handled by software or hardware At present such information is not available so it has to resort to heuristics 20 2 2 Software Defi
25. based communication network Skype faced a near total outage from December 22 2010 to December 23 2010 14 This outage was caused by a combination of a regression and a faulty safety limit in the most popular version of their client software leading to a domino effect of failing supernodes Chapter 1 Introduction In April 2011 the US East region of the world s largest cloud infrastructure provider Amazon AWS 23 suffered a significant outage for 3 days taking down several of the 200 world s most used web sites e g Foursquare Quora and Reddit for significant time 24 The problem was initially caused by an operator error during a routine maintenance Overly aggressive recovery strategies in their network block level stor age systems then caused a rebuild storm and continuous destabilization This affected the overall control plane of the region and in consequence the entire region across sev eral data centers and availability zones designed to fail independently In general cloud offerings are perceived as valuable for their cost effectiveness and scalability but extremely challenging to develop against because the end host server has little insight into what happens and must check performance and validity through indirect measurements and protect against network failure on the application layer This dilemma is likely to gain importance in the future as more and more tradition ally local computing services move to di
26. black boxes In Proceedings of the ACM Symposium on Operating Systems Principles SOSP 2003 SOSP 03 pp 74 89 AKELLA A Macas B SESHAN S SHAIKH A AND SITARAMAN R K A measurement based analysis of multihoming In Proceedings of ACM SIGCOMM con ference on Data communication 2003 pp 353 364 AKELLA A SESHAN S AND SHAIKH A Multihoming performance benefits An experimental evaluation of practical enterprise strategies In Proceedings of the USENIX Annual Technical Conference USENIX ATC 2004 Bibliography 19 ALMI R WANG Y AND YANG Y R Shadow configuration as a network manage 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ment primitive In Proceedings of ACM SIGCOMM conference on Data communication 2008 ALTEKAR G AND STOICA I ODR output deterministic replay for multicore debug ging In Proceedings of the ACM Symposium on Operating Systems Principles SOSP 2009 SOSP 09 ALTEKAR G AND STOICA I Dcr Replay debugging for the datacenter Tech Rep UCB EECS 2010 74 UC Berkeley 2010 ALTEKAR G AND STOICA I Focus replay debugging effort on the control plane In Proc USENIX HotDep 2010 HotDep 10 pp 1 9 AMAZON INC Amazon Web Services http aws amazon com AMAZON INC Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region http aws amazon com message 65648 May 25 2011
27. cor 5 Cc oO 2 85 2 gt oa A a o7 a a Parr 1 AR ee 0 05 0 20 1 00 5 00 20 00 duration Figure 3 9 MWN trace experiment PDF of flow duration ratios with different workloads mean median values are for the full MWN trace 2 21 1 12 and 1 17 0 94 for the reduced set See Table 3 1 for a summary We plot the logarithmic density PDF of the flow durations ratio calculated as duration direct duration routed in Figure 3 9 We note that the shift towards right values larger than 1 is much more pronounced for the full trace experiment This means that flow routing performs better in regions close to the link congestion Figure 3 10 shows the CCDF of flow durations with and without flow routing using the MinLargeFlows strategy We observe that the flows exhibit significantly shorter durations when flow routing is used The experimental results in the testbed for the standard MinLargeFlows routing algorithm compare well with the simulation The median ratio of flow durations is 1 98 in the testbed and 1 99 in the simulator Mean ratio of 3 02 is better in the testbed than 2 47 achieved in the simulator This is partly due to the larger jitters that we observe in the testbed The FatPipe policy achieves flow duration improvements by a mean factor of 3 73 median 2 40 in the simulator Next we explore the effect of the shared interconnection medium wireless or wired For this purpose we rely on the testbed Average and medi
28. ee 90 6 3 1 Experimental Setup e 20004 90 6 3 2 Switch CPU Inflation 2 2 2 Common 91 6 3 3 Broadcast Storms e 200 ek ak 2 en Ge a k 92 6 3 4 Anomalous Forwarding 20 4 94 6 3 5 Invalid Port Translation 2 222 Common nen 94 6 3 6 NOX PACKET IN Parsing Error 95 6 3 7 Faulty Routing Advertisements 2 2 22 22 222mm 96 03 8 DISCUSSION at Se a ee nn a 97 6 4 Evaluation mens aan a a ale Ta 98 6 4 1 Ofrecord Controller Performance 98 6 4 2 Switch Performance During Record 100 6 4 3 DataStore Scalability 2 2 2 on nn nn 100 6 4 4 End to End Reliability And Timing 101 6 4 5 Scaling Further ecg hod aa a ee aa EN 102 6 5 Related Work 0 4 0 04 ele au el Ae OE be 103 6 6 Summary ow is a hate lo dp eh amp Gh eee dhe eels 105 7 Conclusion and Outlook 107 Tiy SUMMARY sra dee Be ne a Bene ele Be 108 C2 Euture Directions 2 sr Sd Ge BS ee Be oe DE AE See 109 List of Figures 113 List of Tables 115 Bibliography 116 xii Bevor ich morgens schnell bei Facebook reinguck hab ich keine Ahnung wie s mir geht Bevor ich morgens schnell bei Facebook reinguck weiB ich nicht ob sich die Welt noch dreht Daniel Dickopf Wise Guys Facebook The Internet is the first thing that humanity has built that humanity doesn t understand the largest experi ment in anarchy that we have ever had Eric Schm
29. for OFRewind 6 6 Summary This work addresses an important void in debugging operational networks scalable economically feasible recording and replay capabilities We present the design imple mentation and usage of OF Rewind a system capable of recording and replaying network events motivated by our experiences troubleshooting network device and control plane anomalies OF Rewind provides control over the topology choice of devices and their ports timeline and selection of traffic to be collected and then replayed in a particular debugging run Using simple case studies we highlight the potential of OF Rewind for not only reproducing operational problems encountered 105 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks in a production deployment but also localizing the network events that trigger the er ror According to our evaluation the framework is lightweight enough to be enabled per default in production networks Some challenges associated with network replay are still under investigation including improved timing accuracy multi instance synchronization and online replay OF Rewind can preserve flow order and its timing is accurate enough for many use cases However further improvements would widen its applicability Furthermore synchronization among multiple Ofrecord and Ofreplay instances is desirable but nontrivial and might require hardware support for accurate time stamping 10
30. have se vere limitations Models and simulations have limited prediction capabilities due to modeling assumptions and abstractions testbeds are limited in scale due to cost factors and trying to fix things on the production network often leads to other er rors 62 97 Therefore all these approaches often do not suffice to diagnose and then resolve real life network problems since these often stem from complex interac tions of many parties Problems that only occur sporadically or are triggered by user interactions are known to be especially problematic even if it is possible to replicate a complete setup in a lab environment 59 Chapter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets We propose to utilize Virtual Networks VNets to help tackle these network diagno sis and troubleshooting problems Recall that VNets expand the existing concepts of virtualized hosts and links to the entire network Therefore a VNet may span mul tiple physical network domains VNet management frameworks such as our control architecture presented in the last chapter unify the management of these resources and enable VNets to be dynamically provisioned and configured and to operate in parallel on a shared physical infrastructure A controlling instance isolates the in dividual VNets from each other As a result it is possible to experiment with one VNet while maintaining stability in the rest of the system In this chapter w
31. in the experiment Moni records data for both VNets on exit of the VNet while the receiver records the quality as experienced by the user We record the percentage of dropped packages on the VoIP call as a rough quality indicator and calculate the Mean Opinion Score MoS as defined by the ITU T E model 60 5 3 2 Experiment Outline For the VoIP traffic we use the pjsip 117 client an open source VoIP client based on SIP It generates traffic at a constant rate of 80 kb s using the G 711 codec with a net bitrate of 64 kb s Each VoIP RTP packet contains 20ms voice and has a payload of 160 Bytes A pool of servers is used to generate the background traffic using Harpoon 138 with properties that are consistent with those observed in the Internet heavy tailed file distributions and self similar traffic emulating the Internet access traffic by the users of the VNet To account for different intensities of the background traffic during different times of the day we use two different load levels L H that correspond to 20 25 60 86 average link utilization All traffic sources are located on the left in Figure 5 3 The experiment is conducted in six phases with a length of five minutes each Fig ure 5 5 shows the rate of the background traffic shaded area averaged over 10s scale The E model states that the various impairments contributing to the overall perception of voice quality e g drops delay jitter are additive when con
32. it is sufficient to mirror routing protocol messages exchanged between external entities and the Mirror VNet Update of a faulty network service Consider a wide area network service based on an overlay network e g a popular Internet telephony system Suppose a number of overlay supernodes crash in irregular intervals due a regression bug 14 In this case the operator can instantiate a Mirror VNet in the exact same state as the production VNet The bugs responsible for the problem are tracked down by manipulating selective traffic passed to the Mirror VNet When a potential fix has been developed the new version is deployed to the Mirror VNet and an increasing amount of traffic is mirrored to the Mirror VNet to validate the bugfix and check against new regressions that may have been introduced This can introduce some overhead especially with regards to bandwidth capacity However the benefit is that the new software components are stress tested under real user traffic and are effectively probed for possible unknown regressions some of which may be very hard to discover in analytical models or test labs When the new version proves stable under full input traffic and thus sufficient confi dence has been gained the outputs of Mirror and production VNets are switched 5 1 4 Discussion The benefits of Mirror VNets are many fold and include Resilience against operational mistakes Mistakes during the configuration and or update p
33. larger mean but a smaller median POP3 transfers are smaller while eDonkey is on the extreme end with many short connections due to control traffic and several larger ones due to data transfers The Other category is a mix of unidentified flow types which also seems to contain a significant amount of P2P traffic From this large collection of flow data we selected a subset of flows referred to as MWN flow trace that originate from IP addresses that are assigned to student residences to ensure that we consider only genuine residential traffic Students are provided Internet access only via 28 NAT gateways The traffic via those NAT 37 Chapter 3 Augmenting Commodity Internet Access with Flow Routing o t S 4 sa ft x f ae opr g x e ak t E a BS att oe T b ote E i J 2 p qi ae H 2 a Ei a ag pee er 1 10 100 1 10 100 direct direct a Full MWN trace b 1 3MWN trace Figure 3 8 MWN trace experiment Scatter plots of flow durations without vs with Flow Routing MinLargeFlows strategy A superimposed contour plot shows the density of oc currences gateways imposes a load of about 0 34 Mbps on the upstream and 5 74 Mbps on the downstream We assigned these 28 NAT gateways to our DSL links randomly Using such a dense tra
34. layer This requires safe access to forwarding control plane each each virtualized device in the VNet Service Provider benefits Service providers like Blizzard Google and Skype are considered the innovation leaders as well as the most profitable Internet players These Service Providers could benefit from a virtualized infrastructure by pushing services into the network and increase the efficiency of existing services e g by imposing latency requirements A blue pill 40 for the current Internet Due to the economical importance of the current Internet stakeholders may be skeptical to move away from it in one go Note however that the current Internet could continue to operate as one legacy VNet in a fully virtualized infrastructure This avoids having to change a running system 65 Probe effect free instrumentation and network wide monitoring The Out of VNet control interface facilitates safe instrumentation and network wide monitoring of the VNet By virtue of the isolation the VNet can still be safely managed and monitored in the presence of traffic surges on the production data plane Conversely 55 Chapter 4 A Control Architecture for Network Virtualization the production data plane traffic is also protected from impact by the monitoring traffic e g when large numbers of flows are monitored Requirements on the underlying virtualization layer Many of the benefits of VNets depend on the isolation quali
35. load balancing Also ISPs do not support connection bundling in their commodity offerings This limits the extent to which statistical multiplexing can be leveraged for bandwidth aggregation To overcome these limitations we propose flow routing to route one user s flows via a wireless shared medium through another user s broadband connection We have presented a first prototypical flow routing system in an earlier work 157 which we refine in this chapter with the help of Software Defined Networks and OpenFlow Also several other multihoming mechanisms have been proposed by other authors e g 129 147 Complementary to these efforts our present work investigates the potential for flow routing and attempts to answer a more fundamental question what is the attainable benefit of flow based routing in such multi homed environments To answer this question we employ hybrid simulations and real testbed experiments in various settings using both synthetic and measurement based traces for repre senting user traffic We propose a flow level simulator FlowSim which simulates various flow routing algorithms based on actual flow traces from real networks as input and use a testbed using commodity wireless home gateways and DSL links Synthetic Web traces generated using Surge 34 and residential access traces from the Munich Scientific Network MWN serve as traffic input Our results show that for bandwidth intensive flows the average downloa
36. manner between all flows that use one link Each bandwidth limited flow exercises a TCP style slow start before it is able to attain its fair share of the bandwidth While connect and close delays are modeled packet losses are ignored Comparisons with results obtained from the testbed for the same set of traces used as input show that the approximations are reasonable For each bandwidth limited flow its fair share of the bandwidth is computed based on its dominant direction s The bandwidth share for the non dominant direction is then set in proportion to the transmitted bytes The results are then scaled to the available bandwidth As an initial validation of the simulator we in Figure 3 3 compare the link utiliza tion s from a simulation run with that of an experiment run in the testbed Each subplot shows the normalized bandwidth usage across time for both the simulator in red color as well as the testbed run in black color With the exception of a few out liers and some lags the curves match closely This indicates that the simplifications within FlowSim are reasonable 3 3 Results To evaluate the potential benefit of flow routing we explore its behavior both in the simulator as well as in the testbed under different workloads We start with a Web workload generated by Surge Then we switch to a trace based evaluation relying on traces from the Munich Scientific Network 32 3 3 Results O A sa ry 5 I A Cc 2 WH
37. platform that extends the concept of virtualization to the network infrastructure In VINI routers are virtual ized and interconnected by virtual links As such VINI allows researchers to deploy and evaluate new network architectures with real routing software traffic loads and network events VINI supports simultaneous experiments with arbitrary network 13 Chapter 2 Background topologies on a shared physical infrastructure It builds on the architecture and management framework introduced by PlanetLab and extends the framework with interfaces to configure virtual links The first implementation based on User Mode Linux 156 offers only limited performance An updated VINI platform Trellis 38 allows for higher forwarding performance It introduces a lower level system virtualization architecture that uses container based virtualization techniques for both system and network stack virtualization Therefore virtualization flexibility is limited to the user space VINI provides rudimentary concepts for end user attachments 12 using OpenVPN tunnels and a single central gateway Downloadable distributions of the PlanetLab control framework and VINI are avail able as MyPLC and MyVINI respectively Emulab Emulab 53 also is a very popular testbed platform Its offers a so phisticated management and life cycle process but does not focus on the network architecture Emulab provides virtual topology configuration based on ns2 config
38. precise time pace We demonstrate its use se in several case studies from a production OpenFlow network and evaluate its scalability 74 Motivating Anecdote Consider the following anecdotal evidence showcasing how problem localization and troubleshooting in operational networks remain largely unsolved problems today Towards the end of October 2009 the administrators of the Stanford production OpenFlow network began observing strange CPU usage patterns in their switches The CPU utilization oscillated between 25 and 100 roughly every 30 minutes and led to prolonged flow setup times which where unacceptable for many users The network operators began debugging the problem using standard tools and data sets including SNMP statistics however the cause for the oscillation of the switch CPU remained inexplicable Even an analysis of the entire control channel data could not shed light on the cause of the problem as no observed parameter number of packets in packets out flow modifications flow expirations statistics requests and statistics replies seemed to correlate with the CPU utilization This left the network operator puzzled regarding the cause of the problem This anecdote further discussion in Section 6 3 2 hints at some of the challenges encountered when debugging problems in networks Networks typically contain black box devices e g commercial routers switches and middleboxes that can be only coarsely configured an
39. quantifies the general impact of deploying Ofrecord in a production network and analyzes the replay accuracy of Ofreplay at higher flow rates 6 4 1 Ofrecord Controller Performance A key requirement for practical deployment of Ofrecord in a production environ ment is recording performance It must record fast enough to prevent a performance bottleneck in the controller chain Using cbench 42 we compare the controller performance exhibited by several well known controllers listed in Table 6 4 Of simple and NOX are stand alone controllers while flowvisor and ofrecord act as a proxy to other controllers Ofrecord is run twice in substrate mode ofrecord recording the OpenFlow substrate traffic and in guest mode ofrecord data additionally performing OpenFlow message translations and outputting sync marker messages Note that no actual guest traffic is involved in this experiment 98 6 4 Evaluation 4 o flowvisor o A nox pyswitch o nox switch 2 J x ofrecord o ofrecord data n T v of simple v 5 gv VI 9 Zu ZN VS Vy vs 8 oe wo 4 BS El gt sj wa ee MA 3 o S o Ql e AA A A AAAA A A 4 4 4 A AA A SS T T T T T 0 10 20 30 40 50 60 Switches Figure 6 9 Controller performance switches vs median flow rate throughputs for dif ferent controllers using cbench The experiment is performed on a single commodity server Intel Xeon L5420 2 5 GHz 8 core
40. some debugging scenarios it is necessary to preserve the exact message order or mapping between guest and substrate flow data to be able to reproduce the problem In concrete terms the guest data traffic should not be replayed until the substrate control traffic containing the corresponding substrate actions has been replayed Otherwise guest messages might be incorrectly forwarded or simply dropped by the switch as the necessary flow table state would be invalid or missing We do not assume tightly synchronized clocks or low latency communication channels between our OF Rewind and the DataStores components Accordingly we cannot assume that synchronization between recorded substrate and guest flow traces or order between flows recorded by different DataStores is guaranteed per se Our design does rely on the following assumptions 1 The substrate control plane channel is reliable and order preserving 2 The control channel between OF Rewind and each individual DataStore is reliable and order preserving and has a reasonable mean latency le e g 5 ms in a LAN setup 3 The data plane channel from OFRewind to the DataStores via the switch is not necessarily fully but sufficiently reliable e g 99 9 of messages arrive It is not required to be order preserving in general but there should be some means of explicitly guaranteeing order between two messages We define the data plane channel mean latency as l Record Based on
41. subsequent unicast ping traffic on Vendor C is consistently higher than that observed for Vendor B and Vendor A switches This indicates that OF Rewind has further potential in profiling switches and controllers 6 3 5 Invalid Port Translation In this case study we operate Ofreplay in the ctrl mode in order to debug a controller issue The controller we focus on is the publicly available FlowVisor 136 FlowVisor FV is a special purpose OpenFlow controller that acts as a proxy between multiple OpenFlow switches and controllers guests and thus assumes the role of a hypervisor for the OpenFlow control plane see Figure 6 4 To this end the overall 94 6 3 Case Studies r OF Controller is ip FlowVisor ip D l Ofreplay a recording the bug b replay of bug Figure 6 7 Invalid port translation case study Schematic overview flow space is partitioned by FV into distinct classes e g based on IP addresses and ports and each guest is given control of a subset Messages between switches and controllers are then filtered and translated accordingly We investigate an issue in where the switch from Vendor C works fine with the NOX controller but not through the FV We record the OpenFlow control plane traffic from the switch to FV in our production setup as seen on the left side of Figure 6 7 We then replay the trace on a developer system running Ofreplay FV and the upstream controller on a single host
42. switch can serve multiple isolated broadcast domains In trunked mode as defined by IEEE 802 1q they enable multiplexing of several Layer 2 links onto a single link Limited isolation can be achieved by using multiple queues and queue priorities On the WAN scale MPLS tunnels can provide a similar benefits Until now link virtualization solutions have lacked custom programmability This is changed by the emerging concept of Software Defined Networks and OpenFlow to be introduced in detail in the next section 2 1 3 VNet Proposals for Experimental Networks Virtualization plays a key role in creating flexible testbeds for Future Internet re search PlanetLab family PlanetLab 36 is a highly successful example of a distributed large scale testbed PlanetLab has a hierarchical model of trust which is rooted in Planet Lab Central PLC PLC is operated by the PlanetLab organization and is the ultimately trusted entity that authorizes access to the resources Other actors are the infrastructure owners and the users that run their research experiments on PlanetLab For each experiment virtual machines on various nodes are grouped to slices that can be managed and bootstrapped together As the deployed virtualization mechanism offers only container based virtualization capabilities at the system level and do not virtualize the network stack PlanetLab offers no network virtualization as such VINI as proposed by Bavier et al 150 is a testbed
43. the NIC directly into the DomUs and thus hides it from the Dom0 pciback see Figure5 2 b In Option a we duplicate the packets inside the host using tc In Option b this is not possible Packets have to be inspected and duplicated externally We can use a statically configured switch port or a dynamically configured open flow switch for this purpose In this work we simulate the use of Multi Queue NIC cards by using several dedicated cards and use an OpenFlow enabled switch for traffic duplication As introduced in Section 2 2 OpenFlow 104 enables an external entity the controller to control Ethernet switches This controller can dynamically set the forwarding rules using wildcard patterns across the packet headers while the frame forwarding is done by the switch hardware Thus OpenFlow is a flexible and powerful solution for the link substrate capabilities required by our approach 65 Chapter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets Node 1 Node 2 Node 3 BG Traffic BG Traffic Receiver Sender VOIP receiver dev null Vnet exit node Traffic flow Figure 5 3 Mirror VNet experiment setup Our prototype implementation uses OpenF low 0 8 9 the current version at the time of the study A custom OF controller based on NOX serves the purpose of mirroring the incoming traffic to both VNets and filtering outgoing traffic according to the status 5 3 Case Study We present a
44. the control and troubleshooting of Operational Networks In this thesis we e investigate the potential of Flow based Routing as a means to improve control over networks and evaluate several flow based routing algorithms an idea that has recently gained main stream momentum in the context of Software Defined Networking initiatives like OpenFlow 104 e propose an Architecture for Network Virtualization the first such architecture to incorporate aspects like information hiding that a prevalent in a realistic multi provider scenario e propose Mirror VNets which can enable safe upgrades and live troubleshooting for Internet services e propose OF Rewind the first tool that enables coordinated record and replay for operational networks In lieu of a single comprehensive one size fits all approach that necessarily would be complex and unspecific given the heterogeneity of of the environments we propose network centric approaches which are tailored to specific scenarios As such each so lution is simpler adapts well to the scenario and consequently can be implemented and adopted more easily In support of this claim all approaches have been imple mented on real systems and evaluated in operational networks Consequently we are confident that our approaches can serve as a data point and guidance on how operational networks need to evolve in view of their increasing importance in our daily lives Background In this section we discu
45. these assumptions we define a logical clock C 92 on Ofrecord incremented for each substrate control message as they arrive at Ofrecord Ofre cord logs the value of C with each substrate control message It also broadcasts the value of C to the DataStores in two kinds of synchronization markers time binning markers and flow creation markers Time binning markers are sent out at regular time intervals i e g every 100ms They group flows into bins and thus constrain the search space for matching flows during replay and help reconstruct traffic characteristics within flows Note that they do not impose a strict order on the flows within a time bin Flow creation markers are optionally sent out whenever a new flow is created Based on the previous assumptions they induce a total ordering on all flows whose creation markers have been successfully recorded However their usage limits the scalability of the system as they must be recorded by all DataStores 83 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Replay For synchronization during replay Ofreplay assumes the role of a synchro nization master reading the value of C logged with the substrate messages When a DataStore hits a synchronization marker while replaying it synchronizes with Of replay before continuing This assures that in the presence of time binning mark ers the replay stays loosely synchronized between the markers within an interval
46. tween the roles mentioned above This layer is responsible for splicing the partial networks provided by the Infrastructure Layer and the presenting them as as a single network to the Service Layer It facilitates the entry of new service providers by abstracting the negotiations with different infrastructure providers and allows for ag gregation of several VNets into one set of infrastructure level resource reservations 2 1 5 Challenges and Ongoing Work Several challenges associated with Virtual Networks are still under active investiga tion Performance of virtualized software routers Several groups have shown that it is possible but challenging to build high performance software routers of commodity hardware For example Egi et al 59 show that in XEN the privileged domain is able to forward packets at near native speed whereas XEN unprivileged domains offer very poor performance As such they conclude that for virtual router platforms all data forwarding should be done in the privileged domains while the unprivileged domains should be restricted to the control plane Bhatia et al 38 investigate several mechanisms on how to improve VINI s forwarding performance on commodity hardware and identify the Linux bridge as a performance bottleneck Several authors investigate parallelism strategies for optimizing performance on multicore software routers 54 58 and identify cache hierarchy coherence as crucial Anwer 30 propose an NetFG
47. with data based on active probing 96 or passive monitoring 32 Another class of systems aims at inferring causality based on collected message traces 16 125 They target the debugging and profiling of individual applications while our purpose is to support debugging of networks Pervasive tracing Some proposals integrate improved in band diagnosis and trac ing support directly into the Internet Fonseca et al 67 proposes X Trace a perva sive cross layer framework to enable in band tracing of network problems A trace ID is propagated from the application to the network stack and included in all associated messages and requests Anand et al 26 propose Net Replay a network primitive which enables in band tracing of network problems in particular short lived perfor mance glitches by marking and remembering recently seen packets throughout the Internet Such approaches face deployment hurdles due to the scale of changes in volved We focus on the more controllable environment of a single administrative domain providing replay support directly in the substrate with no changes required to the network Testing large scale networks Many approaches experience scalability issues when dealing with large networks The authors of 78 suggest to scale down large networks and map them to smaller virtualized testbeds combining time dilation 79 and disk I O simulation to enable accurate behavior This idea may aid scaling replay testbeds
48. 002 2G 3 3 RESUMES fet eS Arne oe he Em a Sy ot oak fore re aah ee eG 3 3 1 Synthetic Web Workload 0 000004 10 11 13 14 15 16 17 18 19 21 22 22 24 25 Contents 3 3 2 Trace Based Experiments 2 2222 m nn nn 36 3 4 DISCUSSION a A a a A re aoe res 41 34 1 Legal Issues x 2 2 ari be A ee dida eS ei BE Al 3 4 2 a ag 05 see a dock 4g ad pecee Baal Se lel ate lb ah E ede Sel 41 3 4 3 Interconnection speed mn nn 42 3 4 4 Unaffected scenario 0 o e eee eee 42 3 5 Related Work 200 e m a a a 42 3 6 SUMMA uta LA Rel oh TA er da 44 A Control Architecture for Network Virtualization 45 4 1 Virtualization Business Roles 2 22 Co on nn nenn 47 4 1 1 Player Goals and Tasks 2 2 2 2 on nn 48 4 1 2 VNet Application Scenarios 2 2 2 nn 49 4 2 VNet Control Architecture mE 50 4 2 1 Control Interfaces 2 Comm 51 4 2 2 VNet Instantiation 2 2 CC Em 52 4 2 3 Out of VNet Access 2 222 oo nn 54 4 2 4 End user End system Access to VNets 54 4 3 Discussion Benefits and Challenges 2 2 2 nn nenn 55 AA Related Works a ea en AS lk 56 4 5 Summary lt aaa bog Goh ae bee Rk a Gee E eae 58 Safe Evolution and Improved Network Troubleshooting with Mirror VNets 59 9 1 Mirror V N ES Sa 22 we hee a as ee eh te le Se ea I a en ech A 61 Sllr Assumptions ic una are ira ee DA 61 5 12 Approach 2 4 2 4 a 88 Saget a bao ea Pa ee a 61 9 1 3
49. 03 both provide frameworks suitable for performing different data reduction techniques Cooke et al 49 aggregate data as it ages first packets are stored these are than transformed into flows These systems are aimed at gathering network statistics rather than reproducing network failures Reducing traffic volume by omitting parts of the traffic is employed by the Shunt 74 and the time machine 99 Their focus is to support intrusion detection and intrusion prevention Our selection strategies borrow many of their ideas more can be incorporated for improved performance Note that these systems do not target network replay and that all integrated control and data plane monitoring systems 103 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks face scalability challenges when monitoring high throughput links as the monitor has to consider all data plane traffic even if only a subset is to be recorded Similar to our approach of recording in a split architecture environment Open Safe 33 leverages OpenFlow for flexible network monitoring but does not target replay or provide temporal consistency among multiple monitors Complementary to our work OpenTM 148 uses OpenFlow statistics to estimate the traffic matrix in a controller domain MeasuRouting 121 enables flexible and optimized placement of traffic monitors with the help of OpenFlow and could facilitate non local DataStores in OFRewind Network rep
50. 2 22 2 222 98 OFRewind end to end performance measurement 102 115 So oo N a Oo A 10 11 12 13 14 15 16 17 18 116 Bibliography Annual Report Deutsche Telekom AG 2008 http www download telekom de dt StaticPage 62 37 50 090227_DTAG_2008_Annual_report pdf_623750 paf AT amp T Reports Fourth Quarter and Full Year Results http www att com gen press room pid 4800 amp cdvn newsknewsarticleid 26597 AT amp T Reports Fourth Quarter and Full Year Results http www att com gen press room pid 4800 amp cdvn news amp newsarticleid 26502 EU Project Ofelia http http www fp7 ofelia eu IETF Working Group Forces http datatracker ietf org wg forces charter NEC Programmable Networking Solutions http www necam com PFlow Nicira Networks Inc http www nicira com OF Rewind Code www openflow org wk index php OFRewind OpenVZ http wiki openvz org tcpdump http www tcpdump org tcpreplay http tcpreplay synfin net VINI End User Attachment http www vini veritas net documentation pl vini user clients Vmware infrastructure http www vmware com products vi CIO update Post mortem on the Skype outage http blogs skype com en 2010 12 cio_update html December 29 2010 AWARD Project http www 4ward project eu AGUILERA M K MOGUL J C WIENER J L REYNOLDS P AND MUTHI TACHAROEN A Performance debugging for distributed systems of
51. 5 Sometimes Ofrecord may only collect meta data but not the original data e g only packet header However for reproducing the problem one may need the full set e g full packets Therefore we plan to constructing dummy synthetic messages e g packets with the same headers but random packet content In a possible extension of this work Ofrecord and Ofreplay are combined to form an online replay mode Recorded messages are directly replayed upon arrival e g to a different set of hardware or to a different substrate slice This may combine the multitude of operation modes and configuration features of OF Rewind with the powerful online troubleshooting functionality of Mirror VNets Our next steps involve gaining further experience with more complex use cases We plan to collect and maintain a standard set of traces that serve as input for automated regression tests as well as benchmarks for testing new network components Thus we expect OF Rewind to play a major role in helping ongoing OpenFlow deployment projects resolve production problems There are ongoing production deployments of OpenFlow enabled networks in Asia Europe as well as the US 106 Conclusion and Outlook Controlling and troubleshooting networks has been is and presumably will remain a challenging task After all the challenges intrinsic to networks including the complexity of handling the distributed state and configuration will not simply go aw
52. 6 headers RFC 2474 Standards track 1998 Nistnet http www x antd nist gov nistnet NOX An OpenFlow Controller www noxrepo org ODLYZKO A M Data networks are lightly utilized and will stay that way Review of Network Economics 2003 Open Networking Foundation http www opennetworkingfoundation org OpenVSwitch http http openvswitch org PAPADOPOULI M AND SCHULZRINNE H Connection sharing in an ad hoc wireless network among collaborating hosts In Proceedings of the ACM Workshop on Network and Operating System Support for Digital Audio and Video NOSSDAV 1999 PFAFF B PETTIT J AMIDON K CASADO M KOPONEN T AND SHENKER S Extending networking into the virtualization layer In ACM HotNets Workshop 2009 New York PHAAL P PANCHEN S AND MCKEE N Inmon corporation s sflow A method for monitoring traffic in switched and routed networks RFC 3176 2001 Open Source SIP Stack and Media Stack for Presence Instant Messaging and Multi media Communication 2009 http www pjsip org The 16 bit AS Number Report http www potaroo net tools asn16 Quagga Routing Suite www quagga net Radware http www radware com RAZA S HUANG G CHUAH C N SEETHARAMAN S AND SINGH J Mea suRouting A Framework for Routing Assisted Traffic Monitoring In Proceedings of the IEEE Annual International Conference on Computer Communications INFO COM March 2010 pp 1 9 Reddit T
53. Berkeley CA USA 2010 USENIX Association pp 8 8 BARFORD P AND CROVELLA M Generating representative web workloads for network and server performance evaluation SIGMETRICS Performance Evaluation Review 26 June 1998 151 160 117 Bibliography 35 BARHAM P DRAGOVIC B FRASER K HAND S HARRIS T Ho A NEUGE 36 37 38 39 40 41 42 43 44 45 46 47 118 BAUER R PRATT I AND WARFIELD A XEN and the art of virtualization In Proceedings of the ACM Symposium on Operating Systems Principles SOSP 2003 pp 164 177 BAVIER A BOWMAN M CHUN B CULLER D KARLIN S Muir S PE TERSON L ROSCOE T SPALINK T AND WAWRZONIAK M Operating system support for planetary scale network services In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2004 pp 19 19 Beacon A Java based OpenFlow controller http www openflowhub org display Beacon Beacon Home BHATIA S MOTIWALA M MUHLBAUER W MUNDAD Y VALANCIUS V BAVIER A FEAMSTER N PETERSON L AND REXFORD J Trellis A platform for building flexible fast virtual networks on commodity hardware In Proceedings of the 3rd International Workshop on Real Overlays And Distributed Systems ACM ROADS 2008 BIENKOWSKI M FELDMANN A JURCA D KELLERER W SCHAFFRATH G SCHMID S AND WIDMER J Competitive analysis for service migrati
54. Data Plane Ofrecord Datarecord Datarecord Datarecord Figure 6 2 OFRewind Traffic strata 78 6 1 OFRewind System Design 6 1 1 Environment Abstractions We base our system design upon split forwarding architectures for instance Open Flow 104 Tesseract 158 or Forces 5 in which standardized data plane elements switches perform fast and efficient packet forwarding and the control plane is pro grammable via an external controlling entity known as the controller Programma bility is achieved through forwarding rules that match incoming traffic and associate them with actions We call this layer of the network the substrate and the higher layer superstrate network running on top of it guest We call the traffic exchanged between the switches and the controller the substrate control plane The higher layer control plane traffic running inside of the substrate data plane e g IP routing mes sages is called the guest control plane The relationship between these layers and traffic strata is shown in Figure 6 2 Even though not strictly mandated almost all split architecture deployments group several switches to be centrally managed by one controller creating a controller domain We envision one instance of OFRewind to run in one such controller domain Imagine e g a campus building infrastructure with 5 10 switches 200 hosts attached on Gigabit links a few routers and an uplink of 10GB s 6 1 2 Design Goals and
55. For instance an experimenter may want to evaluate a new router primitive implemented as a NetFPGA program then require self similar background traffic to be generated and routed through the NetFPGA apply emulated WAN line delay characteristics and finally capture packet level traces at several points in the experiment 2 3 2 Los Altos Testbed We also take advantage of the OpenFlow testbed of T Labs Los Altos depicted in Figure 2 4 The Los altos testbed consists of 6 OpenFlow enabled switches with 48 96 ports from 3 different vendors and 7 commodity 8 core servers with 2 16GB RAM and 500GB to 2 terrabytes of harddrives As the testbed is not as heavily co shared as the Routerlab the devices are managed in an adhoc fashion and the topology is adapted as required 3 Officially Deutsche Telekom Inc R amp D Lab USA 24 2 4 Summary 2 4 Summary In this chapter we introduce two important enabling innovations that form the ba sis of our work Virtual Networks and Software Defined Networks as exemplified by OpenFlow both provide us with powerful tools to control and troubleshoot networks We use the Virtual Networks concept when proposing our Architecture for Virtual Networks in Chapter 4 as well as in the our proposal of Mirror VNets Chapter 5 We use the notion of Software Defined Networks and OpenFlow for Flow Routing Chapter 3 for implementing Mirror VNets and for OF Rewind presented in Chap ter 6 Also we pres
56. Interestingly the predicted mean improvement by the simulator for FatPipe is only slightly better than for MinLargeFlows with a mean improvement of 2 79 vs 2 24 This confirms that the achievable benefit for this scenario is indeed limited by the traffic properties of this specific Web workload 3 3 2 Trace Based Experiments Using traces of real traffic to drive simulations as well as testbed experiments allows repeatability of results under realistic loads 36 3 3 Results Workload We use connection level summaries of traffic traces captured at the border router of the Munich Scientific Network MWN The MWN provides 10 Gbps Internet up stream capacity to roughly 50 000 hosts at two major universities including student dormitories with the daily trafic amounting to 3 6 TB Ample bandwidth is avail able to all users of this network via high speed local area networks Thus Internet usage is not impaired by any bandwidth limitations of the access links In a typical 24 hour workday trace from April 24th 2007 we identify approximately 37 million flows out of which 21 1 million have incomplete connection information records a typical component of todays traffic mix such as SYN attempts 56 rejected connections 27 in progress connections 8 and missing information 9 For our experiments we consider the remaining 15 9 million flows through which 641 GB 182 GB were transferred from to the Internet These volumes corr
57. Ma stab untersuche ich dann Netzwerkvirtualisierung als M glichkeit die Verkn cherung des Internet Kerns zu beheben und neue M glichkeiten f r die Fehlerbehebung und Analyse zu schaffen Ich schlage eine Kontroll Architektur f r Virtuelle Netze vor die auf eine Umgebung mit mehreren konkurrierenden Akteuren zugeschnitten ist Danach widme ich mich konkret der Fehlerbehebung Aufbauend auf Virtuellen Netzen schlage ich Mirror VNets vor die eine sichere Fortentwicklung und Online Fehlersuche und behebung f r komplexe Netzwerkdienste erm glichen Dazu wird ein Produktions VNet mit einem Spiegelnetz kombiniert das in identischer Zu stand und Konfiguration erzeugt wird Die Fehlersuche das Upgrade oder die Rekon figuration kann dann sicher im Spiegelnetz erfolgen erst im Erfolgsfall werden die Netze umgeschaltet Zuletzt wende ich mich der Server Seite des Internet zu Ich untersuche wie neuar tige Architekturen f r Software Defined Networks wie z B OpenFlow uns helfen k nnen Fehler in Netzwerken schneller zu finden und zu beheben Ich schlage OFRewind vor das erste System das es erm glicht Netze aufzunehmen und wieder abzuspielen das gelingt sogar dann wenn diese Netze geschlossene Black boxen enthalten z B kommerzielle Router und Switches die nicht ver ndert oder instru mentiert werden k nnen Ich pr sentiere mehrere Fallstudien die die Anwendbarkeit von OFRewind zeigen Au erdem untersuc
58. Networked Systems Design and Implementation NSDI 2007 GEELS D ALTEKAR G SHENKER S AND STOICA I Replay debugging for distributed applicatinos In Proceedings of the USENIX Annual Technical Conference USENIX ATC 2006 GENI Global Environment for Network Innovations http www geni net ProtoGENI RSpec http www protogeni net trac protogeni wiki RSpec GOLDENBERG D QIU L XIE H YANG Y R AND ZHANG Y Optimizing cost and performance for multihoming In Proceedings of ACM SIGCOMM conference on Data communication 2004 GOLDENBERG D K Qiu L XIE H YANG Y R AND ZHANG Y Optimizing cost and performance for multihoming In Proceedings of ACM SIGCOMM conference on Data communication 2004 GONZALEZ J M PAXSON V AND WEAVER N Shunting A Hardware Software Architecture for Flexible High performance Network Intrusion Prevention In Pro ceedings of the ACM Conference on Computer and Communications Security CCS 2007 pp 139 149 GOOGLE INC Google Docs https docs google com 2011 GUDE N KOPONEN T PETTIT J PFAFF B CASADO M MCKEOWN N AND SHENKER S NOX Towards an operating system for networks ACM SIGCOMM Computer Communication Review CCR 38 3 2008 105 110 Bibliography 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 Guo F CHEN J Lt W AND CKER CHIUEH T Experiences in building A
59. Non goals As previously stated recording and replay functionalities are not usually available in networks We aim to build a tool that leverages the flexibility afforded by split architectures to realize such a system We do not envision OF Rewind to do auto mated root cause analysis We do intend it to help localize problem causes Addi tionally we do not envision it to automatically tune recording parameters This is left to an informed administrator who knows what scenario is being debugged Recording goals We want a scalable system that can be used in a realistic sized controller domain We want to be able to record critical traffic e g routing mes sages in an always on fashion What is monitored should be specified in centralized configuration and we want to be able to attain a temporally consistent view of the recorded events in the controller domain Replay goals We want to be able to replay traffic in a coordinated fashion across the controller domain For replaying into a different environment or topology e g in a lab environment we want to sub select traffic and potentially map traffic to other devices We include time dilation to help investigate timer issues create stress tests and allow fast forwarding to skip over irrelevant portions of the traffic Bisection of the traffic between replays can assist problem localization whereby the user repeatedly 79 Chapter 6 OFRewind Enabling Record and Replay Troubleshoo
60. PA based virtualized NIC card for optimized performance Management of virtualized networks Automated management interfaces are an important aspect of virtual networks This includes the questions of resource alloca tion for virtual networks and the question of when to move which virtual router and which virtual link to which physical resource Good algorithms can reduce downtime and therefore increase availability and stability A nice side effect can be improved energy efficiency The challenges are 1 to find good ways of specifying virtual networks such that the specification entails sufficient degrees of freedom Example approaches include the GENI rspec language 71 2 to find good algorithms for embedding the specified virtual networks onto the physical substrate given the fluctuations in the demands for virtual networks and outages in the physical substrate Yu et al 160 suggest to improve virtual network embedding by adding substrate support for path splitting and migration Chowdhury et al 45 propose an algorithm with coordinated Node and Link Embedding Yeow et al 159 focus on reliability aspects by providing diversification and pooling of backup resources 15 Chapter 2 Background 3 to find efficient methods for migrating virtual links and virtual routers without downtimes The VROOM Virtual ROuters On the Move 154 architecture proposes such live virtual router migration and remapping of virtual links Bienk
61. PACKET IN parsing error 6 3 6 and a non OpenFlow related software problem concerning faulty route advertisements 6 3 7 These case studies also demonstrate the benefits of bisecting the control plane traffic 6 3 2 of mapping replays onto different pieces of hardware 6 3 4 from a production network onto a developer machine 6 3 6 and the benefit of a temporally consistent recording of multiple switches 6 3 7 6 3 1 Experimental Setup For our case studies we use a network with switches from three vendors Vendor A Vendor B Vendor C Each switch has two PCs connected to it Figure 6 4 illustrates the connectivity All switches in the network have a control channel to Of record DataStores running Datarecord and Datareplay are attached to the switches as necessary We use NOX 110 unless specified otherwise as the high level con troller performing the actual routing decisions It includes the routing module which performs shortest path routing by learning the destination MAC address and the spanning tree module which prevents broadcast storms in the network by using Link Layer Discovery Protocol LLDP to identify if there is a loop in the network All OpenFlow applications viz NOX FlowVisor Ofreplay and Ofrecord are run on the same server 90 6 3 Case Studies of sw5 Nox Controller FlowVisor OFRewind Vendor B Figure 6 4 Overview of the lab environment for case studies 6 3 2 Switch CPU Inflation
62. RATNASAMY S Controlling parallelism in a multicore software router In Proceedings of the Work shop on Programmable Routers for Extensible Services of Tomorrow ACM PRESTO 2010 pp 2 1 2 6 DropBox file sychronization service http www dropbox com DUNLAP G W KING S T CINAR S BASRAI M A AND CHEN P M Revirt Enabling intrusion analysis through virtual machine logging and replay In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation OSDI 2002 EGI N GREENHALGH A HANDLEY M HOERDT M Huici F AND MATHY L Fairness issues in software virtual routers In Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow ACM PRESTO 2008 pp 33 38 EGI N GREENHALGH A HANDLEY M HoERDT M Huici F MATHY L AND PAPADIMITRIOU P Forwarding path architectures for multicore software routers In Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow ACM PRESTO 2010 PRESTO 10 pp 3 1 3 6 EGI N GREENHALGH A HANDLEY M HOERDT M MATHY L AND SCHOO LEY T Evaluating XEN for router virtualization In Proceedings of the IEEE Interna tional Workshop on Performance Modeling and Evaluation of Computer and Telecom munication Networks PMECT 2007 The E model a Computational Model for Use in Transmission Planning ITU T Rec G 107 2005 119 Bibliography 61 Fan L BITA N
63. SEN J G JUL E LIMPACH C PRATT lL AND WARFIELD A Live Migration of Virtual Machines In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2005 pp 273 286 Bibliography 48 49 50 51 52 53 54 55 56 57 58 59 60 CLARK D D WROCLAWSKI J SOLLINS K R AND BRADEN R Tussle in Cyberspace Defining Tomorrow s Internet In Proceedings of ACM SIGCOMM conference on Data communication 2002 pp 347 356 COOKE E MYRICK A RUSEK D AND JAHANIAN F Resource aware Multi format Network Security Data Storage In Proceedings of the ACM SIGCOMM Work shop on Large Scale Attack Defense LSAD 2006 pp 177 184 CROVELLA M E AND BESTAVROS A Self similarity in World Wide Web traffic evidence and possible causes IEEE ACM Transactions on Networking 5 December 1997 835 846 Dar R STAHL D O AND WHINSTON A B The economics of smart routing and quality of service In Group Communications and Charges Technology and Business Models 2003 vol 2816 pp 318 331 DESNOYERS P AND SHENOY P J Hyperion High Volume Stream Archival for Retrospective Querying In Proceedings of the USENIX Annual Technical Conference USENIX ATC 2007 pp 45 58 DIKE J A usermode port for the linux kernel In USENIX Linux Showcase amp Con ference 2000 DOBRESCU M ARGYRAKI K IANNACCONE G MANESH M AND
64. WE J Towards interactive debugging for ISP networks In ACM HotNets Workshop 2009 Liu X Guo Z WANG X CHEN F LIAN X TANG J Wu M KAASHOEK M F AND ZHANG Z D3S debugging deployed distributed systems In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2008 pp 423 437 Lockwoop J W McKeown N WATSON G GIBB G HARTKE P NAOUS J RAGHURAMAN R AND Luo J Netfpga an open platform for gigabit rate net work switching and routing In Proceedings of the 2007 IEEE International Conference on Microelectronic Systems Education 2007 MSE 07 pp 160 161 MAHAJAN R SPRING N WETHERALL D AND ANDERSON T User level internet path diagnosis ACM SIGOPS Operating System Review 37 5 2003 106 119 MAHAJAN R WETHERALL D AND ANDERSON T Understanding BGP misconfig uration In Proceedings of ACM SIGCOMM conference on Data communication 2002 pp 3 16 MAIER G FELDMANN A PAXSON V AND ALLMAN M On dominant charac teristics of residential broadband internet traffic In ACM IMC 2009 pp 90 102 MAIER G SOMMER R DREGER H FELDMANN A PAXSON V AND SCHNEI DER F Enriching network security analysis with time travel In Proceedings of ACM SIGCOMM conference on Data communication 2008 MALIK O The Telia Cogent spat could ruin the web for many http gigaom com 2008 03 14 the telia cogent spat could ruin web for many
65. able 6 3 Anomalous forwarding case study switch flow table entry during replay 6 3 4 Anomalous Forwarding To investigate the performance of devices from a new vendor Vendor C we record the substrate and guest traffic for a set of flows sending 10 second delayed ping between a pair of hosts attached to the switch from Vendor B of sw3 in Figure 6 4 We then use the device port mapping feature of Ofreplay to play back traffic from c7 to c8 over port 8 and port 42 belonging to the switch from Vendor C in Figure 6 4 Upon replay we observe an interesting limitation of the switch from Vendor C The ping flow stalls at the ARP resolution phase The ARP packets transmitted from host c7 are received by host c10 but not by c8 nor c9 The flow table entry created in of sw4 during replay is shown in Table 6 3 similar to that created during the original run We conclude that the FLOOD action is not being properly applied by the switch from Vendor C Careful observation reveals that traffic received on a low port one of the first 24 ports to be flooded to any high ports last 24 ports and vice versa is not flooded correctly Effectively the flood is restricted within a 24 port group within the switch lower or higher This fact has been affirmed by the vendor confirming the successful debugging We additionally perform the replay after adding static ARP entries to the host c7 In this case we observe that flow setup time for the
66. an flow durations vary by less than 15 between a wireless shared medium with good connectivity and a wired one The DSL emulation through NistNet achieves less than 3 average and median variation in flow lengths Figure 3 11 compares the density distribution of the flow durations when using DSL lines or NistNet for the Internet connection and Ethernet or Wireless for the testbed interconnections 39 Chapter 3 Augmenting Commodity Internet Access with Flow Routing oO 5 direct 4 routed hund A 1 7 no Sa 5 I 7 jo 3 2 o J D l 2 vr _ l 1 10 100 duration Figure 3 10 MWN trace experiment CCDF of flow durations with vs without routing 2 NistNet Ethernet e DSL Ethernet co 4 NistNet 802 11a o probability density 0 2 05 10 2 0 5 0 10 0 50 0 duration Figure 3 11 MWN trace experiment PDF of flow durations on different network media 40 3 4 Discussion 3 4 Discussion From our results we observe that Flow Routing can enable communities to self improve the reliability and performance of their Internet access lines Especially during periods of congestion and for bulky flows performance gains can be significant We now discuss some limitations of the usability of this scheme 3 4 1 Legal Issues When Internet access lines are shared legal responsibility for the use of the Internet access line can be problematic as the contractual customer may be held respons
67. and switches and different levels of data plane involvement switch datahdr datafull see Section 6 1 5 Optionally a flow table dump created by Ofrecord can be installed into the switches prior to replay It supports traffic sub selection and mapping towards different hardware and time dilation Datareplay The Datareplay components are responsible for re injecting guest traffic into the network They interact with and are controlled by Ofreplay for timing and synchronization The implementation is based on tcpreplay Depending on the record and replay mode they reconstruct or synthesize missing data before replay e g dummy packet payloads when only packet headers have been recorded 6 2 2 Synchronization As we do not assume precise time synchronization between Ofrecord and the Data Stores the implementation uses time binning markers and flow creation markers as discussed in Section 6 1 6 These are packets with unique ids flooded to all Data Stores and logged by Ofrecord The ordering of these markers relative to the recorded traffic is ensured by OpenFlow BARRIER messages We now discuss by example how the markers are used Record synchronization Figure 6 3 a illustrates the use of flow creation markers during recording Consider a simple Ofrecord setup with two hosts c1 and s con nected to switch sw The switch is controlled by an instance of Ofrecord which in turn acts as a client to the network controller ctrl Ofrecord re
68. and Resource Control http hub opensolaris org bin view Project crossbow WebHome Tao S Xu K Xu Y FEI T GAo L GUERIN R KUROSE J TOWSLEY D AND ZHANG Z L Exploring the performance benefits of end to end path switch ing In Proceedings of the IEEE International Conference on Network Protocols ICNP 2004 Private communication with a Large European Internet Service Provider TM THOMPSON N HE G AND Luo H Flow Scheduling for End host Multihoming In IEEE Infocom 2006 TOOTOONCHIAN A GHOBADI M AND GANJALI Y OpenTM traffic matrix esti mator for OpenFlow networks In Proceedings of the Passive and Active Measurement Conference PAM 2010 pp 201 210 Urs HOELZLE This is your pilot speaking Now about that holding pattern http googleblog blogspot com 2009 05 this is your pilot speaking now about html May 14 2009 Vini http www vini veritas net viprinet http www viprinet com Virtual Box http www virtualbox org Linux VServer http linux vserver org WANG Y KELLER E BISKEBORN B VAN DER MERWE J AND REXFORD J Virtual Routers on the Move Live Router Migration as a Network Management Primitive ACM SIGCOMM Computer Communication Review CCR 38 4 2008 231 242 WDS Linked Router Network http www dd wrt com wiki index php WDS_Linked_ router_network WHITE B LEPREAU J STOLLER L RICCI R GURUPRASAD S NEWBOLD M HIBLER M
69. and technologies but also switched interconnections to other testbeds and projects Labtool the Routerlab management platform This varied landscape of devices is managed by our custom software management system called Labtool Labtool presents a unified vendor agnostic interface to the experimenter for device reserva tion configuration interaction e g console access power management and topol ogy management It also maintains a complete and historically versioned picture of the physical and logical network testbed topology Labtool is integrated with an automated system configuration and disk imaging tool which allows disk images and router and switch configurations to be deployed quickly onto arbitrary experimenta tion devices Labtool is experiment centric in that it organizes all of its functionality around the management configuration and repeatable deployment of experimental topologies and device configurations The software architecture of the Labtool utilizes a three layer client server and database structure and is built to be extendable and scriptable with a client API in Ruby Labtool provides the following functionalities Experiment life cycle management The Labtool maintains an experiment level view of all the actions it performs This means that devices the physical and virtual links connecting them and their individual configurations are kept in the un derlying database schema This allows for easier hibernation
70. apter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets Node 1 Node 2 Node 3 Traffic generation node VNET transfer Traffic receiver node Figure 5 7 Mirroring performance experiment setup 5 4 1 Evaluation Setup For our evaluation we rely on a three node setup Each node has two Quad Core Intel Xeon L5420 processors running at 2 5GHz 16GB of RAM and 4 8 1GBit s Intel Ethernet ports The schematic setup is shown in Figure 5 7 We deploy Debian Linux 4 0 with XEN 3 0 3 which is part of the distribution We use this out of the box configuration as it resembles a possible production deployment better than custom hand optimized kernel and hypervisor versions The virtual network consists of 3 nodes Node 1 is the traffic source while Node 3 is the sink Node 2 forwards the traffic from Node 1 to Node 3 5 4 2 Forwarding Results On UNIX systems forwarding performance is usually dominated by the per packet overhead As such our baseline experiment uses minimum sized packets and explores the performance impact of the various options on how to attach the link to the virtual node and how to do packet duplication see Section 5 2 Figure 5 8 shows the boxplots of the forwarding performance within 1 second time bins for an experiment duration of 500 seconds Results are grouped according to the phases of the experiment by the dashed vertical red lines In the first two phases we baseline our setup by measuring the f
71. ardware but present a custom in terface to the guests for communicating with the hypervisor Consequently they require changes to the guest operating systems but potentially offer increased per formance Note however that the distinction is not clear cut Even full virtualization solutions offer para virtualized device drivers for improved I O performance and XEN offers a fully virtualized operation mode today Also the overhead of full virtualization has been reduced with the help of hardware virtualization interfaces such as the VT x technology from Intel 84 Many full or para virtualization solutions use a hypervisor or virtual machine mon itor a thin kernel running directly on the hardware that arbitrates access to the operating systems running inside of the virtual machines Often one such virtual machine is designated as privileged machine also called privileged domain or driver domain This machine is granted access to the system hardware to handle i e network interfaces and storage devices It also communicates with a protected hy pervisor interface to control and monitor operations of the other virtual machines XEN and many others feature live migration support in which a virtual machine is transferred to another physical host in powered on state They use incremental delta transfers to minimize the downtime induced by the migration Some environments pose additional challenges for virtualization In particular thi
72. as a precautionary measure during upgrades Enabling flow creation sync markers for the low volume routing control plane messages ensures the global ordering is preserved The observation that router C loses its route to Network 1 while router B maintains its route keys the operator to record traffic arriving at and departing from B An analysis of the Ofrecord flow summaries reveals that although RIPv1 advertisements arrive at B from A no advertisements leave B toward C Host based debugging of the RIPd process can then be used on router B in conjunction with Ofreplay to replay the trigger sequence and inspect the RIPd execution state This reveals the root cause of the bug routes toward Network 1 are not announced by router B due to this 0 99 9 version s handling of classful vs CIDR IP network advertisements an issue inherent to RIPv1 on classless networks 96 6 3 Case Studies OF Controller OFRewind f PataStore Router A of sw1 Router B of sw2 Router C l l l Network 1 Network 2 Network 3 Network 4 Figure 6 8 Faulty route advertisements case study Setup 6 3 8 Discussion Without making any claims regarding the representativeness of the workload or switch behavior in this limited space we highlight in these case studies the prin ciple power and flexibility of OF Rewind We observe that OFRewind is capable of replaying subpopulations of control or data traffic over a select network topology swi
73. ay Furthermore we expect networks will continue to grow in speed scale and geographical spread In particular we foresee more and more traditionally local computing services move to distributed cloud based infrastructures Consequently the availability and performance of such services depends on our ability to precisely control instrument and troubleshoot the involved networks Indeed the complexity of networks is increasing and will likely continue to increase fast This is largely independent of any troubleshooting features and driven by performance flexibility and cost requirements Cloud services and Virtual Networks run on physical infrastructure shared by multiple independent tenants In such environments troubleshooting a malfunction in an ad hoc manner is very difficult for a tenant as the lower layers of the architecture are inaccessible for inspection without dedicated troubleshooting interfaces Software Defined Networks can forward based on arbitrary cross layer flow attributes and thus greatly increase the flexibility for network operators However they also create new failure modes unknown in a classical routed network Our approaches can serve as a guidance how we can use virtualization to save it from itself and leverage the additional power and flexibility incurred by virtual and software defined networks to deal with their added complexity 107 Chapter 7 Conclusion and Outlook Reconsider our example from
74. cal storage labeled Ofrecord and Ofreplay and Datarecord and Datareplay re spectively Record Ofrecord captures substrate control plane traffic directly When guest net work traffic recording is desired Ofrecord translates control messages to instruct the relevant switches to selectively mirror guest traffic to the Datarecord modules OFRewind supports dynamic selection of the substrate or guest network traffic to record In addition flow based sampling can be used to record only a fraction of the data plane flows Replay Ofreplay re injects the traces captured by Ofrecord into the network and thus enables domain wide replay debugging It emulates a controller towards switches or a set of switches towards a controller and directly replays substrate control plane traffic Guest traffic is replayed by the Datareplay modules which are orchestrated by Ofreplay 80 6 1 OFRewind System Design 6 1 4 Ofrecord Traffic Selection While it is in principle possible to collect full data recordings for every packet in the network this introduces a substantial overhead both in terms of storage as well as in terms of performance Ofrecord however allows selective traffic recording to reduce the overhead Selection Flows can be classified and selected for recording We refer to traffic selection whenever we make a conscious decision on what subset of traffic to record Possible categories include substrate control traffic guest network
75. case study highlighting the potential of Mirror VNets for troubleshoot ing a problem in a production network Consider the following scenario A VNet operator that offers both VoIP and Internet access across a best effort VNet con siders moving to a setup with service differentiation to offer better quality of service QoS to its VoIP traffic For our experiment a VoIP call and background traffic of varying intensity is routed through the virtualized substrate shown in Figure 5 3 The substrate network consists of three nodes We now instantiate two parallel VNets VNet A and B each with a maximum bandwidth of 20 Mbit s throughout the experiment enforced by traffic shaping on node 2 Moreover we setup an additional virtual network for monitoring On entry to the VNet traffic is duplicated to both VNets A and B and forwarded within each via node 2 to node 3 using separate virtual links VLANs On exit when leaving node 3 only output from one VNet is sent to the receivers The monitoring VNet Moni receives a copy of the VoIP traffic from both VNets 66 5 3 Case Study R User Satisfaction MOS 100 5 0 93 2 Very Satisfied 44 90 43 Satisfied 80 4 0 Some users 70 dissatisfied ig Many users dissatisfied 60 3 1 Nearly all users s0 dissatisfied si Not recommended 0 1 0 Figure 5 4 Overview of MoS voice quality ratings 5 3 1 Experiment Metrics For our evaluation we measure at two points
76. ce allows us to investigate times with peak traffic while keeping the durations of our experiments relatively short 30 minutes To quantify the performance of our flow re routing against different traffic loads we run experiments with the MinLargeFlows strategy on the testbed using the full MWN trace in addition to a random subselection of 1 3 of the total number of flows reduced set Performance Analysis Given that the short flows suffer from the overhead imposed by the specific imple mentation chosen for our prototype we again concentrate on bulky flows those that last longer than 0 5 seconds Figures 3 8 a and 3 8 b show scatter plots of flow du rations Each point represents a flow with the duration of the direct routing policy on the X axis and the duration of the re routed policy on the Y axis The overlaid contour lines plot the density of measurement points in one region More points below the x y diagonal imply more flows that benefit from routing The density peak for the experiment with the full MWN trace is significantly below the diagonal whereas the peak for the reduced MWN trace is closer to the diagonal The experiment shows improvements with respect to the flow durations for the former case a mean factor of 3 02 median 1 98 and in the latter case by a factor of 2 04 median 1 02 When considering all flows including the short ones the 38 3 3 Results Em MWN A 1 3 MWN
77. ce and outsource all other operational aspects The business entity Player B may act as an integrated network manager and provisioner and offer a network as a service to Player C that encompasses VNO and VNP service buying its bit pipe from Player A In a different scenario Player A operates as value added PIP It runs its own infrastructures as a PIP but also acts as VNP that assembles a VNet consisting of parts of its own infrastructure and from other PIPs Player B may then offer the VNO service to the Service Provider Player C 49 Chapter 4 A Control Architecture for Network Virtualization Yet another option is that Player C provisions and manages its own VNet in addition to its service while owning no physical infrastructure It thus acts as SP VNO and VNP acquiring the basic resources from PIPs A and B This is similar to the situation in cloud datacenters today that rent out infrastructure as a service to customers who then run and manage their own virtual machines e g Amazon AWS 23 to Reddit 122 Consider how the proposed GENI architecture 70 fits within our framework The GENI clearinghouse is a VNP The experimenter is the VNO and if they desire the SP As such GENI also realizes the split between PIP and VNP However as GENI does not yet consider federation it does not consider the implications of having to handle multiple PIPs Note that in the business context resource virtualization is alr
78. control traffic or guest data traffic possibly sub selected by arbitrary match expressions We illustrate an example selection from these categories in Figure 6 2 Sampling If selection is unable to reduce the traffic sufficiently one may apply either packet or flow sampling on either type of traffic as a reduction strategy Cut offs Another data reduction approach is to record only the first X bytes of each packet or flow This often suffices to capture the critical meta data and has been used in the context of intrusion detection 99 Protocol summaries Alternatively it is possible to pre process the data and extract higher level protocol information e g BGP messages HTTP protocol headers or OpenFlow control messages Note that while it is possible to combine any of the above mentioned techniques it is not possible to rank these traffic selection strategies according to their resource consumption or replay accuracy Sometimes cut offs can be more accurate than protocol summaries as they contain per packet time stamps Other times the reverse is true as protocol summaries may contain semantic content relevant for the scenario When choosing a traffic selection strategy one should also keep in mind the number of devices from which to select the traffic Moreover it is possible to apply different selection strategies to different network components Ultimately the advantage of using a selection strategy that reduces traffic volume d
79. cords to the local storage of store and controls an instance of Datarecord running on a DataStore Assume that a new TCP connection is initiated at c1 toward s1 The following chain of events ensures the correct synchronization of new flows during recording A BARRIER message ensures that all prior OpenFlow messages are processed before subsequent messages are handled In its absence messages may be reordered 86 6 2 Implementation KT_IN tep_syn 3 PKT_IN c1 tcp syn 4 FLOW MOD 61 gt 51 3 sync c gt dr E PKT_ ou 7 sync 8 AER MoD et gt s dr i 9 Noastop_ sy 70 tep syp pS 6 O 9 sw Datarecord Ofrecord of store ctrl a Ofrecord gusta 2 sync wait rien E syne ok syn zum prom tcp syn EEE S oe 9 wo 9 sw Datareplay Ofreplay of store b Ofreplay Figure 6 3 DataStore synchronization mechanism in OFRewind 87 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 c1 generates a tcp syn packet sent to the switch As no matching flow table entry exists sw sends msg an OpenFlow PACKET IN to Ofrecord Ofrecord in turn relays it to ctrl Ctrl may respond with msg2 a FLOW MOD message To enable synchronized replay and reassembly of the control and data records Ofrecord now creates a flow creation marker sync containin
80. d instrumented via command line or simple protocols such as SNMP Often the behavior of black box components in the network cannot be understood by analytical means alone controlled replay and experimentation is needed Furthermore network operators remain stuck with a fairly simplistic arsenal of tools Many operators record statistics via NetFlow or sFlow 116 These tools are valuable for observing general traffic trends but often too coarse to pinpoint the origin prob lems Collecting full packet traces e g by tepdump or specialized hardware is often unscalable due to high volume data plane traffic Even when there is a packet trace available it typically only contains the traffic of a single VLAN or switch port It is thus difficult to infer temporal or causal relationships between messages exchanged between multiple ports or devices Previous attempts have not significantly improved the situation Tracing frameworks such as X Trace 67 and Netreplay 26 enhance debugging capabilities by pervasively instrumenting the entire network ecosystem but face serious deployment hurdles due to the scale of changes involved There are powerful tools available in the context of distributed applications that enable fully deterministic recording and replay oriented toward end hosts 69 89 However overhead for the fully deterministic recording of a large network with high data rates can be prohibitive and the instrumentation of black mid
81. d time can be reduced by up to a factor of 3 This emphasizes the substantial potential benefit of flow routing among commodity broadband connections To summarize this work makes the following contributions e A flow routing scheme that enables the combination of several commodity In ternet access lines for increased reliability and performance e A flow based simulator and an experimental setup for evaluating flow routing reproducible results are obtained and the difference between ideal and progres sively realistic experiments is quantified e Several flow routing strategies ranging from idealized ones in which full knowl edge of links and flows is assumed to a practical and realizable one that is suitable for implementation on a router 27 Chapter 3 Augmenting Commodity Internet Access with Flow Routing Server Figure 3 1 Example of a community network with Flow Routing e An evaluation of the benefits and potential of the various flow routing strategies in multi homed environments using synthetic and real traffic loads 3 1 Flow Routing Approach Consider the scenario shown in Figure 3 1 It depicts a community of users accessing the Internet via DSL links provisioned by different ISPs that share an ad hoc wireless LAN User 1 may experience congestion on her connection due to a large persistent upload However if User 3 s Internet connection has spare bandwidth User 1 may be able to redirect her traffic to U
82. d to end principle challenges The Internet architecture is built around an end to end principle and aims to concentrate intelligence and state management at the end hosts This increases clarity and simplicity facilitates end host innovation and has allowed the Internet to grow from its feeble ARPANet beginnings to its current state However it also limits our troubleshooting abilities as typically the end hosts have very little insight into the conditions of the network The consequent layering enables clear and simple interfaces and independent evolution of the lower layers but it also hides valuable troubleshooting information from the components that depend on it 1 2 Challenges for Network Troubleshooting KISS In the spirit of the KISS principle 130 there is very little instrumentation support built into the architecture e g for out of band notifications or performance isolation Consequently measurements and diagnostics often have to be attempted in band This increases the complexity of the higher layers and incurs the risk of probe effects where the property under observation is inadvertently changed by the observation itself There have been numerous proposals to improve the control and troubleshooting features of the Internet architecture and technology stack e g Diff Serv Cross Provider MPLS etc but these have faced challenges in their adoption for organizational and economic reasons Overall there exists a fun
83. damental trade off between the simplicity and clarity af forded by these principles and the limits in debugging and troubleshooting they impose Approaches that aim at improving the instrumentation and control capabil ities in the Internet architecture must consider the cost associated with the added complexity Organizational and economic challenges Despite the intrinsic and architectural challenges outlined above there have been sev eral technologically promising proposals to improve the situation like inter provider MPLS 61 and DiffServ 108 Most of these have gained only limited traction in practice though a fate they share with other proposals for evolving the Internet architecture and core services like DNSSec cBGP and even IPv6 This leads us to conclude that organizational and economic challenges play an important role for the practical adoption of innovations on the Internet Distributed administration While some networks are controlled by a single opera tor others are managed by more complex groups of operators with relationships of differing trust levels In virtualized multi tenant datacenters a single owner controls the hardware but the virtual hosts and networks are controlled by independent ten ants with no trust relationship or even knowledge amongst themselves The Internet in its entirety is controlled in a distributed fashion by roughly 37 000 Autonomous Systems As exemplified by the accidental Youtube h
84. dleboxes and closed source software often remains out of reach 75 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Introducing OFRewind In this chapter we present a new approach to enable practical network recording and replay based upon an emerging class of network architectures called split forwarding architectures as introduced in Section 2 2 e g OpenFlow 104 Tesseract 158 and Forces 5 Recall that these architectures split control plane decision making off from data plane forwarding In doing so they enable custom programmability and centralization of the control plane while allowing for commodity high throughput high fanout data plane forwarding elements We discuss in Section 6 1 the design of OF Rewind a tool that takes advantage of these properties to significantly improve the state of the art for recording and replay ing network domains OF Rewind enables scalable temporally consistent centrally controlled network recording and coordinated replay of traffic in an OpenFlow con troller domain It takes advantage of the flexibility afforded by the programmable control plane to dynamically select data plane traffic for recording This improves data path component scalability and enables always on recording of critical low volume traffic e g routing control messages Indeed a recent study has shown that the control plane traffic accounts for less than 1 of the data volume but 95
85. e show how properly implemented VNets enable us with good diag nosis and debugging capabilities We propose Mirror VNets which replicate networks and traffic in a safe fashion Thus the new Mirror VNet and the production VNet can operate in parallel and the user traffic is duplicated either completely or in part to both networks This allows the network operator to investigate a problem and locate its root cause in the Mirror VNet without interfering with the production traffic Then a fix can be developed tested and deployed even with real user traffic again without affecting the production setup Once the network operator is convinced that the new setup is stable and fixes the problem he can switch the production VNet with the Mirror VNet in a near atomic fashion Therefore Mirror VNets offer network operators a new range of capabilities from a safely evaluating and testing new configurations via b testing new software components at same scale of the production network and under real user traffic to c troubleshooting live networks This approach builds on the agility and isolation properties of the underlying virtu alized infrastructure and does not require changes to the physical or logical structure of the production network Instead a network owner can dynamically provision a Mirror VNet as required It does not require changes to the production network within the VNet its protocols its applications or its configuration Thi
86. eady practiced due to high operation costs Mobile base stations are increasingly shared between mobile operators Undersea cables are typically not operated by one business alone Overall the wholesale business e g sharing of the access network infrastructure is increas ing As such VNOs and VNPs already exist even today But there are currently no well defined interfaces between them 4 2 VNet Control Architecture In this section we introduce our VNet Control Plane Architecture which provides the control and management functions for the virtual network architecture to the various actors The control plane must perform a balancing act between the following tussles e Information disclosure against information hiding e Centralization of configuration and control against delegation of configuration and control The information disclosure tussle is a subtle one and we will try to illustrate this through multiple scenarios The first scenario is accounting each customer needs to be able to verify that contractual obligations are met by the provider Conversely this must be possible without forcing the provider to release sensitive information to them or others For example a customer can request certain Quality of Service QoS guarantees across the PIP s network without any information on the exact physical path The second scenario which is arguably the most challenging is network debugging It is a complex problem to provide enoug
87. eal residential scenarios The distribution of the testbed nodes ensures wireless connectivity among them Each node consists of a wireless router with IEEE 802 11a b g interfaces and a client ma chine which is also equipped with a wireless interface The routers are directly con nected to the Internet via 2 Mbps DSL lines and to the corresponding client machines using an Ethernet interface The client based flow routing system FlowRoute allows us to evaluate the benefits of flow routing in real world testbeds Hence effects not easily captured in a simulator such as the impact of different shared interconnection mediums wired vs wireless Ethernet etc can be studied For some of the experiments we need to flexibly tune the properties of the access lines e g the delay drop parameters and bandwidth For these experiments we replace the DSL lines with the NistNet network emulator 109 The NistNet emulator is installed on a separate machine that is accessible by all testbed nodes via the management network 3 2 3 Simulator FlowSim We have developed a simulator called FlowSim 101 to evaluate in a scalable manner the potential of flow routing strategies using flow level traces as input captured from real networks or testbed experiments Popular packet level simulators such as ns 2 or SSF Net are not suitable for our purpose given the large number of flows considered here To validate the simulator we reproduce the testbed experiments
88. eb based administration interface For an OpenFlow switch as seen in Figure 2 1 b another interface is added to the embedded system that allows direct fine grained control over the flow table via the OpenFlow protocol To this end the traffic is grouped into flows Each flow can be associated with specific actions that cause its packets e g to be directed to a specific switch port or on a specified VLAN The flow definition can be tailored to the specific application case OpenFlow supports a 11 tuple of packet header parts that can be matched on ranging from Layer 1 VLAN ports via Layer 2 and 3 MAC and IP addresses to Layer 4 TCP and UDP ports This separation facilitates implementing novel routing switching or traffic manage ment approaches To this end operators or experimenters can write a piece of user space controller software and run it on commodity PC acting as controller for Open Flow switches Note that the actual data plane forwarding is still performed by the switch and at line rate Open Flow thus potentially enables a whole range of new research and engineering approaches including cheap routers flexible middle box platforms monitoring and debugging and traffic engineering 2 2 2 An Example of an OpenFlow Message Exchange We now discuss an example of the messages exchanged for setting a up a flow in an OpenFlow enabled network as shown in Figure 2 2 At the center are the OpenFlow 18 2 2 Software Defi
89. eb workload mix including Web 2 0 and P2P as observed in the MWN traces We use the popular Apache2 software as our Web server To impose a reasonable load we use four Surge instances per household host This Web workload results in an average utilization of 0 39 Mbps per DSL link Testbed Results Figure 3 4 displays the complementary cumulative distribution function CCDF of the flow durations on a log log scale for an experiment with NistNet and a wired in terconnection network for the flow routing strategy MinLargeFlows One can clearly see the benefit of flow routing for longer flows as durations with flow routing are shorter than without The corresponding logarithmic probability density function PDF is shown in Figure 3 5 highlighting that the flowrouting system imposes some overhead for short flows To quantify the achievable benefit we compute the ratio of the durations more pre cisely we compute duration direct duration routed Larger values denote better performance under flow routing Considering all flows the mean benefit is 1 11 with a median of 0 90 The benefit is small due to the prevalence of short flows in this scenario which all suffer from the overhead of our prototype flow routing implemen tation When we only consider flows with a duration larger than 0 5 seconds the 34 3 3 Results http https edonkey 17 pop 3 other log10 P received bytes gt u 4 1 10 100 10000 1e 06 1e 08
90. ebug and troubleshoot problems Due to the extreme diversity of the environments we do not strive for a one size fits all solution but propose and evaluate several approaches tailored to specific important scenarios and environments We emphasize network centric approaches that can be implemented locally and are transparent to the end hosts In the spirit of trusting running code we implement all our approaches on the metal and evaluate them in real networks We first explore the Potential of Flow Routing as an approach available to end users to self improve their Internet Access We find Flow Routing to be a viable cost efficient approach for communities to share and bundle their access lines for improved reliability and performance On a wider scale we explore Network Virtualization as a possible means to to over come the ossification of the Internet core and also enable new troubleshooting primi tives We propose a Control Architecture for Network Virtualization in a multi player multi role scenario We next turn to troubleshooting Based on Network Virtualization we propose Mirror VNets as a primitive that enables safer evolution and improved debugging abilities for complex network services To this end a production VNet is paired with a Mirror VNet in identical state and configuration Finally we explore how Software Defined Network architectures e g OpenFlow can be leveraged to enable record and replay troubleshooti
91. ed be the most viable and useful use case for Flow Routing and increasingly important as the diversity of Internet Access solutions available to the end customer continues to increase 3 5 Related Work The areas of local community networking and connectivity sharing have been well explored and some enterprise solutions 18 72 77 have even been deployed in the real world Bundling connectivity by utilizing multiple links in parallel is often used in access networks as well as backbones where it is commonly known by the term channel bonding The mechanism assumes that the links terminate at the same devices Commercial efforts similar to flow routing and targeted to centrally administered enterprises use the name smart routing Smart routing is marketed by a number of companies including Internap 85 Radware 120 Angran 25 Mushroom Net works 107 and Viprinet 151 The proposed algorithms independent of the general Internet routing focus on cost in addition to network performance Goldberg et al 73 analyze the performance of smart routing and its potential both for interfer ing with BGP and for self interference The authors of 51 show that smart routing can bring economical benefits even to the ISPs 42 3 5 Related Work Akella et al 18 find that multihoming has the potential of improving throughput performance by up to 25 compared to using only the best ISP connection In addition Akella et al 17 repor
92. ensure that the environment is properly initialized We suggest therefore to use the flow table dump feature and preferably reset whenever possible the switches and controller state before starting the replay operation This reduces any unforeseen interference from previously installed bad state When bisecting during replay one must consider the interdependencies among mes sage types FLOW MOD messages are for example responsible for creating the flow table entries and their arbitrary bisection may lead to incomplete or nonsense forwarding state on the switch Generally speaking replay inaccuracies can occur when a the chain of causally correlated messages is recorded incompletely b synchronization between causally correlated messages is insufficient c timers influence system behavior and d net work communication is partially non deterministic For a and b it is necessary to adapt the recording settings to include more or better synchronized data For c a possible approach is to reduce the traffic being replayed via sub selection to reduce stress on the devices and increase accuracy We have not witnessed this problem in our practical case studies Case d requires the replayed traffic to be modified If the non determinism stems from the transport layer e g TCP random initial se quence numbers a custom transport layer handler in Datareplay can shift sequence numbers accordingly for replay For application non determi
93. ent the testbeds used for early practical evaluation of our work In particular the flexible Routerlab platform is used throughout our work except the specific case studies in OF Rewind 25 Augmenting Commodity Internet Access with Flow Routing We start our journey following the flow on its way from the end user s laptop to a cloud datacenter server in the residential context and target commodity Internet access lines Due to the broad adoption of broadband DSL and cable lines and NAT routers often offered as contractual gifts by Internet Providers 98 we can assume that the first network a flow encounters is likely to be a small wireless network followed by the user s commodity WLAN router and her DSL or cable based broad band line In a similar fashion commodity Internet access lines have also become popular for small and medium businesses due to their low costs and relatively high bandwidths 137 Why do these two network hops pose challenges relevant to our mission Well typ ically they are not redundant Hence they represent a single point of failure for the user s ability to access cloud services Also they can present a performance bottleneck for the user s experience This is especially true for upstream traffic as the upstream bandwidth is typically an order of magnitude smaller than the adver tised downstream bandwidth in in many consumer targeted Internet offerings This can cause problems e g for HD video c
94. erely provide traffic isolation full administrative control as well as potentially full customization of the virtual networks VNets are also required This also enables non IP networks to be run alongside the current Internet realized as one future virtual network Each of these virtual networks can be built according to different design criteria In this chapter we present a network virtualization architecture for a Future Internet which we motivate by analyzing business roles In contrast to the GENI initiative 70 our goal is not to provide an experimental infrastructure but to identify the key roles and stakeholders that are necessary to offer virtual network based services across the Internet We identify four main players roles namely the Physical Infrastructure Providers PIPs Virtual Network Providers VNPs Virtual Network Operators VNOs and Service Providers SPs This re enforces and further develops the sepa ration of infrastructure provider and Internet service provider advocated in 63 161 Indeed we will show that the architecture encompasses other proposed network vir tualization architectures This virtual network architecture is specifically designed to enable resource sharing among the various stakeholders thereby increasing its adoptability In today s In ternet ISPs as well as service providers e g Google are continuously searching for opportunities to either increase revenue or to reduce costs by launchin
95. ers have commodity broadband Internet access lines User 1 has a cable Internet connection User 2 a DSL connection Both users use a commodity WLAN router with OpenFlow enabled firmware installed e g a Linksys WRT 132 An OpenFlow controller local to each network serves as the flow routing manager In our research context we use a controller running on a commodity PC connected to the router via wired Ethernet For a production environment the controller process may alterna tively be deployed directly onto the router Consider a situation where a new client flow is started at User 1 s notebook but her local cable line is congested due to other traffic When arriving at User 1 s router wrt1 the new flow triggers a PACKET IN message to her controller of ctrl1 Of ctrl1 determines that the local line is con gested while the line attached to wrt2 is empty Accordingly it decides to reroute the flow via User 2 and sends a corresponding FLOW MOD message to wrt1 The flow is thus redirected via a wireless network that spans the residential community e g using WDS 155 When the flow arrives at wrt2 and causes a PACKET IN at User 2 s controller of ctri2 it is admitted and a FLOW MOD is sent that routes the flow to User 2 s DSL line Every controller monitors the utilization of its local line by FLOW STATS requests in regular intervals say every 5 seconds They also keep track of the number of flows admitted to the local line at any g
96. espond to an average bandwidth utilization of 60 Mbps 17 Mbps downstream upstream To better understand the characteristics of the traffic we classify the flows according to the application that most likely generated them as identified by the port number About 73 50 of the flows are HTTP 7 83 HTTPS 2 74 eDonkey 0 52 POP 3 and 15 41 are other traffic Figure 3 6 shows the CCDF complimentary cumulative distribution function of the received bytes for different applications on a log log scale We observe that the flow sizes of the applications are consistent with the heavy tailed distributions that have previously been reported e g 50 The behavior of eDonkey may seem strange at first but this is due to its two trafic components the control channel and data transfer connection Part of the byte contributions of other P2P file sharing protocols are captured by the Other class hence it is not surprising that the tails of the two curves coincide The other P2P traffic is contained in the HTTP class The mean number of bytes over all connections is 43 409 and the median 795 Similar observations hold for the bytes sent per flow To investigate the actual flow size distributions we plot the PDF probability density function of the logarithm of the transfer sizes on a logarithmic X axis in Fig 3 7 HTTP HTTPS exhibits the expected distribution with a small spike that corre sponds to the typical header size HTTPS has a
97. ey may still have to be interconnected Interface 4 The setup of virtual links between PIPs in contrast to Interface 3 needs to be standardized in order to allow for interoperability across PIP domains Once the whole VNet has been assembled the VNO is given access to it Interface 5 This interface is also called Out of VNet access and is necessary as at this point in time the virtual network itself is 51 Chapter 4 A Control Architecture for Network Virtualization not yet in operation Thus a management interface outside of the virtual network is needed Once the virtual network has been fully configured by the VNO and the service is running end users can connect to the virtual network Interface 6 We now discuss how each player benefits from this virtualization architecture PIPs can better account for the constraints imposed by the VNets For example before scheduling maintenance work or for traffic engineering purposes they might migrate some virtual nodes to minimize downtime or to optimize their traffic flow This is possible as long as the the new location is embedding equivalent i e satisfies all of the requirements and imposed constraints and enabled by the level of indirection in troduced by our architecture and the use of modern migration mechanisms 154 47 For VNPs migration between PIPs offers a mechanism to optimize their revenue by choosing competitive and reliable PIPs As pointed out by 161 the re
98. for debugging Ofreplay thus assumes the role of the switch Through repeated automated replay of the trace on the development host we track down the source of the problem It is triggered by a switch announcing a non contiguous range of port numbers e g 1 3 5 When FV translates a FLOOD action sent from the upstream controller to such a switch it incorrectly expands the port range to a contiguous range including ports that are not announced by the switch e g 1 2 3 4 5 The switch then drops the invalid action Here OFRewind proves useful in localizing the root cause for the failure Replaying the problem in the development environment enables much faster turnaround times and thus reduces debugging time Moreover it can be used to verify the software patch that fixes the defect 6 3 6 NOX PACKET IN Parsing Error We now investigate a problem reported on the NOX 110 development mailing list where the NOX controller consistently drops the ARP reply packet from a specific host The controller is running the pyswitch module 95 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks The bug reporter provides a tcpdump of the traffic between their switch and the controller We verify the existence of the bug by replaying the control traffic to our instance of the NOX We then gradually increase the debug output from NOX as we play back the recorded OpenFlow messages to NOX Repeating this processe
99. fornia They got me interested in the virtues and limits of Software Defined Networks and convinced me of the benefits of Golden Sunsets fresh avocados and incredible Sushi bars Thanks a lot Then again life with just work wouldn t rock so hard either I have had some great times on the road with my friends at INET NYC 07 comes to mind recall what conference it was Thomas and Gregor a cool road trip down the pacific north west Hey ho Microbrews Fabian a crazy Barcelona stint with mostly everyone on board hiking in Pyrenees I say let s order the boar Bernhard and Grsch and of course great three months in CA with Nadi and Dan the second time around And locally countless parties in F hain with the usual suspects Messieurs TH and JSZ I am looking at you that made sure I will remember I was living im Dicken B and not in G tersloh after all well as much as I remember those parties anyway but that s another story and shall be told another time Cudos as well to everyone I have irresponsibly overlooked here Next I need to turn to my home base in Geretsried that I haven t quite been able to abandon in spite of all the Big City allure Big thanks to my crowd at teleteach especially to Thomas Herrmann founder boss and fatherly friend who always wel comed me and made do with the time I could spare for our little software house Turning to the other brain half greetings to my a cappella band Singsang Baldi
100. g a unique id the current time and the matching rule of msg and msg2 Both msg1 and msg2 are then annotated with the id of sync and saved to of store Ofrecord then sends out 3 messages to swi first a PACKET OUT message containing the flow creation marker sent to all DataStores This PACKET OUT message prompts the switch to send out sync to all its attached DataStores The second message sent from Ofrecord is a BARRIER message which ensures that the message from step 7 is handled before any subsequent messages Ofrecord sends a modified FLOW MOD message directing the flow to both the original receiver as well as one DataStore attached to the switch This prompts the switch to output the flow both to s step 10a and DataStore step 10b Replay synchronization For synchronizing replay Ofreplay matches data plane events to control plane events with the help of the flow creation markers recorded by Ofrecord Consider the example in Figure 6 3 b Based on the previous example we replay the recording in data plane mode towards the switch sw and host s1 Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 88 Ofreplay starts Datareplay playback on the DataStore Datareplay hits the flow creation marker sync then sends a sync_wait message to the controller and goes to sleep Ofrecord continues replay operation until it hits the corresponding flow creation marker sync on the of store Then it sig
101. g OpenFlow Controllers We now give an overview of popular existing OpenFlow controllers as summarized by Table 2 1 There is no fundamental restriction that limits the deployment to a single controller 19 Chapter 2 Background Table 2 1 Overview of popular OpenFlow controllers as of 05 2011 Controller Language Category Plugin Model Protocol SimpleController ANSI C Technology Demo 1 1 NOX C Python Controller framework C Python modules 1 0 Beacon Java Controller framework OSGI components 1 0 FlowVisor ANSI C Virtualization Controller ANSI C modules 1 0 A newer version is based on Java OpenFlow SimpleController There is a simple controller implementation available within the OpenFlow reference implementation It mostly serves as a technology demo and baseline reference By default it behaves similar to a learning switch When an unmatched packet hits the controller a hash table of MAC addresses to port mappings is checked If the destination MAC address is known to be attached to certain port a flow is installed that outputs the packet and all subsequent ones belonging to this flow to the correct port Otherwise the packet is flooded to all attached ports The hash table is updated on every PACKET IN NOX NOX 110 76 is the most widely used controller implementation It is free software published under the GNU Public License GPL and has been developed by Nicira 7 NOX has been described as
102. g new services investing in new technology CAPEX or by decreasing operational costs OPEX To understand the order of magnitude of the investment cost consider that AT amp T plans to invest 17 18 Bn in 2009 2 compared to a revenue of 124 Bn in 2008 3 and Deutsche Telekom invested 8 7 Bn compared to revenues of 62 Bn in 2008 1 46 4 1 Virtualization Business Roles Thanks to increased resource sharing even a modest reduction in the investments of say 1 can result in several millions of savings per year The analysis of business roles is presented in Section 4 1 Section 4 2 provides details of the virtual network architecture We discuss the benefits and challenges of Virtual Networks in Section 4 3 In Section 4 4 we give an overview of related work in comparison to our approach We summarize our findings in Section 4 5 4 1 Virtualization Business Roles The major actors in the current Internet are service providers e g Google and Internet Service Providers ISPs Hereby an ISP offers customers access to the In ternet by relying on its own infrastructure by renting infrastructure from someone or by any combination of the two Service providers offer services on the Internet In essence ISPs provide a connectivity service very often on their own infrastruc ture even if they also lease part of that infrastructure to other ISPs For example AT amp T and Deutsche Telekom are mainly Internet Service Provider
103. ground entire virtual networks run isolation on shared hardware in isolation from each other As such they may also span multiple physical or administrative domains Over the last years virtual network architectures have been an area of active research Some groups have focused on using network virtualization to enable larger scale and more flexible testbeds Other groups aim at virtualizing production networks or even the Internet Virtual Networks vs VPN and overlays Virtual networks differ from overlay net works in that they provide controlled visibility and control of the underlying network the underlay In contrast overlays have no visibility into the network they are running on For instance they cannot modify the routing protocol used by the un derlay and can infer network properties only by in band measurements Classical VPNs Virtual Private Networks especially MPLS based Layer 2 VPNs are similar to Virtual Networks but typically do not include computing resources Often they are only available within the confines of a single operator network and cross provider connections require manual intervention We now introduce virtualization as a concept then discuss system and link virtu alization as the building blocks for virtual networks We then discuss proposals for Virtual networks and their applications and benefits and the challenges that are under ongoing investigation 2 1 1 Virtualization as a Concept
104. guration based on ns2 configuration files and automatic bootstrapping of experiment nodes In GENI 70 a large scale U S initiative for building a federated virtualized testbed all operations are signed off and managed by a central Geni Clearing House which can thus be regarded as analogue to our VNP As a possible growth path GENI plans support for federated clearing houses During phase 1 of the development both VINI Planetlab and Emulab are used as GENI prototypes ProtoGeni All testbed oriented architectures mentioned above do not consider several key fac tors relevant for virtualizing the commercial Internet They assume a hierarchical trust model that centers on a universally trusted entity e g the PLC GENI clearing houses To overcome this limitation we consider competing players with individual administrative zones that have only limited trust and also have the desire to hide information e g their topologies Economic models and use cases are not critical for testbed designs but are crucial for the adoption of an Internet wide virtualization architecture Architectures for Production Networks Prior proposals targeted at production networks have included CABO 63 and Cabernet 161 CABO proposes to speed up deployment of new protocols by allowing multiple concurrent virtualized networks in parallel with service providers operating their own customized network inside of allocated slices of physical networks managed by infra
105. h ss tod he Be aE a re 1 2 Challenges for Network Troubleshooting 1 3 Guiding Principles 2 2 2 2 Comm LA Outline obs aaa ae a OO a ee ee 1 5 Our Contribution x visa a 28 2 en a managen Background 2 1 Virtual Networks 2 Coon on 2 1 1 Virtualization as a Concept Properties and Benefits 2 1 2 System and Link Virtualization 2 2222 222 2 1 3 VNet Proposals for Experimental Networks 2 1 4 VNet Proposals for Production Networks 2 1 5 Challenges and Ongoing Work 2 2 Software Defined Networks OpenFlow 2 2 1 Overview of OpenFlow 020 4 2 2 2 An Example of an OpenFlow Message Exchange 2 2 3 Existing OpenFlow Controllers 2 2 4 Existing Switch Implementations 2 3 NCSU DOAS ics since a A a Sk ews te ve I 2 3 1 FG INET Routerlab BERLIN 2s tava ea eee es 2 3 2 Los Altos Testbed 2 nennen 2 4 SUMMA un a hen Ge bah Sk an hb ab eet andes Augmenting Commodity Internet Access with Flow Routing 3 1 Flow Routing Approach 002000000000 e 3 1 1 Earlier Prototype FlowRoute 3 1 2 OpenFlow Based Flow Routing 3 2 Methodology ssar rinio 2 Muse a hy Ae Pee ee ie ae E 3 2 1 Flow Routing Strategies 2 2 22 on on nn 3 2 2 Flow Routing Testbed FlowRoute 3 2 3 Simulator FlowSim es ca cos 0
106. h information to for example a VNO to enable them to debug a problem with the physical path in PIP without providing too much information 50 4 2 VNet Control Architecture n 2 E fa 3 gt ac Virtual Network Figure 4 2 VNet control interfaces between players Where configuration and control are undertaken is another tussle For example the PIP should be able to render delegate low level management of the virtualized network components via the VNP to a VNO whilst hiding it from another VNO 4 2 1 Control Interfaces In the following we identify the control interfaces see Figure 4 2 in our architecture by discussing how the various players interact in order to setup a VNet To begin with the SP hands the VNO its requirements Then the VNO adds its requirements and any constraints it imposes on the VNet This description is sub sequently provided via Interface 1 to the VNP of its choice which is in charge of assembling the VNet The VNP may split the request among several PIPs e g by using knowledge about their geographic footprints and send parts of the over all description to the selected PIPs via Interface 2 This negotiation may require multiple steps Finally the VNP decides which resources to use from which PIP and instructs the PIPs to set up their part i e virtual nodes and virtual links of the VNet Interface 3 Now all parts of the VNet are instantiated within each PIP but th
107. have been utilized in our research We next turn to a local community network scenario We propose FlowRouting as an approach available to residential communities of end users to self improve their network connectivity and increase their available bandwidth at times of peak demand and study its potential Statistical multiplexing can be attractive as the average utilization of residential DSL lines has been shown to be low We find that even simple load balancing algorithms can significantly improve the user experience in times of peek demand in particular for upstream traffic On a larger scale we explore Virtual Networks VNets as a possible means to over come the ossification of the Internet core and propose an architecture for Network Virtualization in a multi player multi role scenario The proposed architecture dif fers from existing approaches in that it investigates the business roles for example leading to information hiding which is prevalent in a realistic multi provider sce nario With this architecture as a basis we next turn to troubleshooting and explore how the improved control afforded by VNets can benefit our troubleshooting abilities We propose Mirror VNets as a primitive that enables safer evolution and improved debugging abilities for complex network services Here a production VNet is paired with a parallel Mirror VNet that is spawned in the same configuration and state as the original network Then troubleshooting
108. he Voice of the Internet http www reddit com REIss F STOCKINGER K Wu K SHOSHANI A AND HELLERSTEIN J M Enabling real time querying of live and historical stream data In Proceedings of the 19th International Conference on Scientific and Statistical Database Management 2007 SSDBM 07 REYNOLDS P KILLIAN C WIENER J L MOGUL J C SHAH M A AND VAHDAT A Pip Detecting the unexpected in distributed systems In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation NSDI 2006 REYNOLDS P WIENER J L MOGUL J C AGUILERA M K AND VAHDAT A WAP5 black box performance debugging for wide area systems In Proceedings of the International World Wide Web Conference WWW New York NY USA 2006 ACM pp 347 356 123 Bibliography 126 127 128 129 130 131 132 133 134 135 136 137 138 124 RIPE YouTube Hijacking A RIPE NCC RIS case study http www ripe net internet coordination news industry developments youtube hijacking a ripe ncc ris case study March 2008 Rivas R AREFIN A AND NAHRSTEDT K Janus a cross layer soft real time ar chitecture for virtualization In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing New York NY USA 2010 HPDC 10 ACM pp 676 683 ROBERTSON S P VATRAPU R K AND MEDINA R The social life of social netwo
109. he ich seine Skalierbarkeit und zeige dass es mindestens so gut wie aktuell bliche Controller Implmentierungen skaliert und deshalb die Skalierbarkeit eines OpenFlow Netzes nicht signifikant beeinflusst Zusammengefasst schlage ich mehrere einfache aber effiziente szenario spezifische und netzwerk zentrische Ans tze vor die die Kontrolle und Fehlerbehebung f r Netz werke verbessern k nnen vom Heimnetz ber die hemische Internet Leitung bis zum gro en Datacenter Alle Ans tze wurden praktisch implementiert und in echten Net zen evaluiert Sie k nnen daher als Hinweisgeber daf r dienen wie Netzwerke sich weiterentwickeln m ssen um ihrer wachsenden Bedeutung f r unseren Alltag gerecht werden zu k nnen viii Pre published Papers Parts of this thesis are based on pre published papers co authored with other re searchers I thank all of my co authors for their valuable contributions All co authors have been acknowledged as scientific collaborators of this work WUNDSAM A LEVIN D SEETHARAMAN S AND FELDMANN A OF Rewind Enabling Record and Replay Troubleshooting for Networks accepted to USENIX ATC 2011 Portland Oregon to appear MEHMOOD A WUNDSAM A UHLIG S LEVIN D SARRAR N AND FELDMANN A QoE Lab Towards evaluating Quality of Experience for Future Internet Conditions In Proceedings of 7th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Comm
110. he lock step approach taken to coordinate the replay of multi ple instances of Datarecord and Datareplay see Section 6 1 6 can be extended to synchronize multiple instances of OF Rewind running as proxies to instances of a distributed controller The same trade offs between accuracy and performance apply here as well 6 5 Related Work Our work builds on a wealth of related work in the areas of recording and summa rizing network traffic replay debugging based on networks and on host primitives automated problem diagnosis pervasive tracing and testing large scale systems Recording summarizing network traffic Apart from the classical tool tepdump 10 different approaches have been suggested in the literature to record high volume network traffic Anderson et al 27 records at kernel level to provide bulk capture at high rates and Antonelli et al 29 focuses on long term archival and stores traffic on tapes Hyperion 52 employs a dedicated stream file system to store high volume data streams indexing stream data using Bloom filters While these systems are not aimed at reproducing network failures their basic methodology may be used to gather data for OF Rewind Another approach is to store higher level abstractions of the network traffic to reduce the data volume Reiss et al 123 record flows and provide real time query facilities Shanmugasundaram et al 133 record key events of activity such as connections and scans and 44 1
111. her network services inside the VNet 54 4 3 Discussion Benefits and Challenges 4 3 Discussion Benefits and Challenges We now discuss the benefits and challenges associated with a Virtual Network archi tecture as outlined above Present virtualization approaches Note that many aspects that comprise a vir tual network are already present in today s operator networks For instance MPLS is widely employed and layer 2 VPNs are offered by many providers However management of these systems is often semi manual and thus complicated and error prone Also no standardized negotiation interfaces exist between providers As such these technologies are often only available within a single provider domain The virtual network architecture presented here standardizes the interfaces adds the missing cross provider management interfaces and thus reduces the need for manual intervention when configuring these features Optimize for specific goals The current Internet has to fulfill many goals at the same time some of which are outright contradictory Virtual Network provide the opportunity to optimize each network to a particular goal e g seamless mobility security anonymity low latency high throughput cost effectiveness This can signif icantly ease the management of each individual VNet Note that not all VNets have to run the IP protocol stack It is assumed here that VNet operators can customize their VNet down to the datalink
112. her zu verwalten und Fehler zu beseitigen und zu beheben stark beschr nkt und reichen nicht aus H ufig haben wir nur eingeschr nkten Einblick in das was in den Netzen passiert In letzter Zeit gab es mehrere aufsehenerregende Ausf lle von wichtigen Internet Diensten die das deutlich gemacht haben 24 14 149 126 Einige der Gr nde f r die Schwierigkeiten Netze sicher zu verwalten und Fehler zu finden liegen in der Natur der Angelegenheit Netzwerke sind inh rent hoch kom plexe verteilte Systeme und ihr Zustand und Konfiguration verteilen sich auf viele Einzelknoten Deshalb ist es oft schwierig einen konsistenten berblick ber ihren Zustand zu gewinnen Sie sind auch in hohem Ma e heterogen Ihre Gr e rangiert von kleinen leeren Heim Netzwerken bis zu Netzwerken in Data Centern die enorme Datenmengen zwischen zehntausenden Rechnern austauschen Ihre geographische Ausdehnung kann sich auf einen einzelnen Serverschrank oder auf mehre Kontinente erstrecken Das Internet vereint all diese unterschiedlichen Netzwerke und damit auch deren Herausforderungen Zus tzlich haben sich weder die Architektur unserer Netze noch unsere Werkzeuge in den letzten Jahren angemessen weiterentwickelt Deshalb wurde der Internet Architektur und dem Internet Core in den vergangenen Jahren Verkn cherung attestiert 48 Dies hat zur Folge dass Fehler in echten Netzen auch heute noch oft nur durch Ausprobieren und Raten gefunden und behobe
113. hout monitoring a directly attached DomU forwards at 961 6 kpps We then enable packet duplication via option b sim ulated OpenFlow packet duplication using a manually configured switch monitoring port As expected the performance impact is minimal forwarding is at 953 kpps Even when the monitoring domain is overloaded with 100 CPU load and 100 hard drive I O load forwarding performance degrades by only 5 to 896 kpps We conclude that probe effect free Mirror VNets are possible However their per formance strongly depends on the isolation properties offered by the virtualization platform for network I O Naive soft bridge approaches result in severe performance penalties but we were able to demonstrate that direct PCI attachment and external mirroring removes this bottleneck and that with the deployment of emerging technologies like OpenFlow large scale probe effect free Monitoring VNets will indeed be feasible 71 Chapter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets 5 5 Related Work Our work bears some similarities to the Shadow Config approach by Alimi et al 19 designed to improve the safety and smoothness of configuration updates but by virtue of the underlying virtualization extends the scope beyond configuration changes An other sibling to our approach has been proposed by Lin et al 93 The authors introduce a framework that enables full reproducibility by recording and replayi
114. i ble for violations e g of copyright laws committed by users that share his access Approaches to this problem include limitation of forwarded traffic non repudiable cryptographic logs and IP separation by the provider Limiting forwarded traffic Participants may choose to only forward certain types of traffic on behalf of other users e g excluding Bit Torrent and NNTP traf fic However the usefulness of this approach deteriorates as HTTP hosters like RapidShare 98 are increasingly used for distribution of media content of questionable origin Cryptographic logs The Flow Routing system can be augmented by cryptographic means to provide non repudiable signatures on forwarding requests This can help a user to prove who was the original requestor of certain traffic Provider integration If the Internet provider partakes in the distribution scheme traffic from different users can be assigned different IP addresses and thus legally attributed to different users This is a clean solution and liberates the sharing user from responsibility for the forwarded traffic but requires collaboration from the provider 3 4 2 Fairness Fairness can become an issue in a Flow Routing community when users utilize their access lines to a different degree This can be addressed by augmenting the Flow Routing system with a compensation scheme e g a maximum cap on the inbalance of traffic forwarded between two participants Local traffic can be p
115. ically replicate traffic as required For our case study and performance evaluation we build a prototype Mirror VNets system 64 5 2 Prototype Implementation Dom0 Monitor Prod Monitor Soft Bridge A PCI Back PCI Back 1 Virtual Node Monitor Virtual Node Monitor Switch e External External Mirror Port Interface Interface a internal bridging b external bridging Figure 5 2 Mirror VNets Options for link attachment From the host virtualization options discussed in Section 2 1 2 we choose XEN XEN has been shown to be a viable solution for building high performance routers on commodity hardware 59 if functional blocks are selected and placed carefully Per formance isolation and fairness issues can be challenging especially with regards to network I O 38 57 Highly beneficial for our case XEN also supports live migra tion Based on this feature we can extend the hypervisor to support instant creation of mirror nodes in identical state This essentially corresponds to a live migration to localhost without disbanding the original guest Our prototype system is based on XEN 3 4 On the link layer we consider several options for link attachment to study the per formance and isolation by current virtualization techniques Option a uses the standard Linux software bridge see Figure 5 2 a Option b maps
116. idt Introduction The two quotes above illustrate the fundamental dilemma of the Internet today On the one hand its growing importance The authors of the first quote state that before checking with Facebook in the morning they hardly know how they are or whether the world is still turning In other words users are increasingly relying on Internet services like Facebook Twitter Google and Skype for their private and professional lives The Internet is also considered a growing political factor Efficient use of social networks has been cited as one of the success factors in the 2008 U S presidential election 128 Social networks also have been named driving factors of the recent revolutions in the Middle East by popular news media though the point is still under discussion 66 143 On the other hand as stated by second quote from Google s then CEO Eric Schmidt the Internet as a whole still operates very much in ad hoc fashion and is not safe from operational failures even by the people arguably at the center of its innova tion This was exemplified when a misconfiguration in Google s routing caused their services to be slow or unavailable on May 14 2009 149 Other high profile network outages in recent years have included Pakistan Telecom trying to block Youtube for their customers and inadvertently disrupting the service globally by announcing the prefix 208 65 153 0 24 on February 24 2008 126 More recently the overlay
117. iffer ent solutions for different sizes and network characteristics When challenging and adopting Internet architecture principles it is important to consider the trade offs this incurs for scalability and clarity And it is important to consider the organiza tional and economic challenges faced by changes that require pervasive upgrades 1 3 Guiding Principles We now summarize the guiding principles of our work that follow from our basic approach and the challenges outlined in the past two sections Adapt to scenario We investigate networks at different scales A one size fits all approach is difficult due to the vast range in scale and characteristics Each approach should work well for a given scenario and network type Isolation We want to limit the impact of our improved control and debugging abil ities on the production traffic Our observation should not introduce probe effects Deployability Our approaches should consider the technological organizational and economical conditions of the given scenario We emphasize solutions that can be incrementally deployed Network perspective Our solutions must work inside the network That means they must be transparent to the end host and application level software 1 4 Outline 1 4 Outline We start out by discussing the background of our work This includes a rundown of the status quo the enabling technical innovations and descriptions of the basic testbeds and networks that
118. ijacking by the Pakistan In ternet Exchange this system depends to a large degree on the correct behavior of its participants Such complex administrative structures make ad hoc debugging infeasible and require clear interfaces that provide controlled troubleshooting and instrumentation abilities without disclosing unwanted information Granted it looks like 2011 may be the year that IPv6 will finally unfold Announced AS numbers as of May 27 2011 118 Chapter 1 Introduction Economic hurdles to incremental adoption Adoption of many useful proposals that enrich the classical best effort Internet architecture with additional features useful for troubleshooting and improved control has been inhibited by economic hur dles Often a feature is not very useful until deployed by a large fraction of oper ators Thus nobody wants to move or invest first keeping the Status Quo at an impasse 28 Other proposals violate the business interests of influential economic stakeholders e g require operators to disclose details about their topologies and consequently have small chances of adoption Summary In summary improving our troubleshooting and control abilities for Operational Net works faces a number of important challenges Our approaches must cope with the fundamental properties of networks Due to the wide distribution in scale and usage a one size fits all solution may be hard to find so we may have to investigate d
119. ilable production networks or testbeds As with other OpenFlow based systems the performance of OFRewind is limited by the switch flow table size and the switch performance when updating and querying the flow table We observe these to be the most common performance bottlenecks in OpenFlow setups today Controller domain scalability is limited by the capacity of the link that carries the OpenFlow control channel and the network and CPU performance of the controller Specific to OFRewind the control plane components require sufficient I O performance to record the selected OpenFlow mes 102 6 5 Related Work sages not a problem in typical developments When recording data plane network traffic DataStore network and storage I O capacity must be sufficient to handle the aggregate throughput of the selected flows As load balancing is performed over DataStores at flow granularity OF Rewind cannot fully record individual flows that surpass the network or storage I O capacity of a single DataStore When flow cre ation markers are used for synchronization the overhead grows linearly with the number of DataStores and the number of flows Thus when the average flow size in a network is small and synchronization is required this may limit the scalability of a controller domain For scaling further OF Rewind may in the future be extended to a distributed controller domain While a quantitative evaluation is left for future study we note that t
120. imited This has been exemplified by several recent outages that have caused significant disruption of important Internet services 24 14 149 126 Part of the challenges for controlling and troubleshooting networks stem from the nature of the problem Networks are intrinsically highly distributed systems with distributed state and configuration Consequently a consistent view of the network state is often difficult to attain They are also highly heterogeneous Their scale ranges from small home networks to data center networks that transfer enormous amounts of data at high speeds between thousands of hosts Their geographic spread may be confined to a single rack or span the globe The Internet combines all these different kinds of networks and thus their individual challenges In addition the network architecture and the available toolset has evolved little if at all over the past decade In fact the Internet core and architecture has been diagnosed with ossification 48 Thus debugging problems in an operational network still comes down to guesswork as the architecture provides little support for fault localization and troubleshooting and available tools like NetFlow traceroute and tcpdump provide either only coarse grained statistical insight or are confined to single vantage points and do not provide consistent information across the network In this thesis we explore how to improve our control over networks and our abilities to d
121. in Figure 4 3 in blue dashed lines Every player maintains a control inter face hosted on dedicated management nodes for out of VNet access to the VNet resources This interface provides a console interface as well as control options such as virtual resource power cycling and also debugging and instrumentation of the Virtual Network These communication channels should transparently handle migrations both within the PIP as well as across PIPs To this end multiple layers of indirection may need to be used as indicated in the Figure e g though a chain of proxies The different out of band interfaces should also be isolated from one another and from the data plane traffic This enables safe management of the VNet in the presence of data plane traffic surges but also protects the production dataplane from the traffic caused by the debugging interfaces e g when tracing or monitoring 4 2 4 End user End system Access to VNets End users end systems wishing to dynamically join a VNet need to be authenticated at their physical attachment point in their local PIP before being connected to the VNet To this end a dedicated authentication and management VNet can be used The end system requests authentication through the authentication VNet Then the request is forwarded from its local PIP to the responsible VNO authentication service Only when authenticated the end system is attached to the VNet and configures its address routing and ot
122. influence our control and troubleshooting abilities and thus warrant investigation For instance flow aggregation has been suggested as a means to improve the scalability of OpenFlow domains However coarse grained aggregated flow table entries may reduce our ability to selectively monitor instrument mirror and record traffic So given a certain scenario traffic mix and instrumentation objectives how fine grained should the flow definitions be Which flows should be aggregated Distributed controllers have been suggested as another means to scale controller do mains Clearly there exists a connection between the communication scheme of the distributed instances the scalability of such distributed controllers and the consis tency properties they can achieve The exact form that such controllers may take and consequently their impact on troubleshooting is not yet clear Lastly there is a fundamental trade off that affects all of our approaches Any mech anism that adds flexibility for the purpose of powerful troubleshooting or customized control necessarily also adds complexity to the system itself makes it more heavy weight and consequently prone to errors The Internet has arguably fared very well by keeping the intelligence out of the network its architecture simplistic and fea ture set minimal However there is increasing evidence that further growth in scale performance and importance may not be sustainable based on these classical
123. itting the VNet appropriately and selecting the best value for money PIP It also negotiates the appropriate service level agreements to setup the desired virtual network VNet Operator The VNO provisions and sets up the empty virtual network pro vided by the VNP It seeks to minimize its expenses required to operate the VNet The VNO either receives a VNet specification by the SP or high level service level requirements In the latter case it transforms these higher level re quirements into an appropriate VNet specifications Generally we assume that the VNO has no knowledge of how its VNet is realized across one or multiple PIPs Its task is the day by day operation of the VNet Service Provider The service provider is the end customer of this chain of respon sibilities As such a SP has to specify service level requirements both for the topology of the virtual network as well as for the operation of the virtual net work Its goal is to receive a network that enables the service to run in an optimal way at low costs 4 1 2 VNet Application Scenarios Let us consider some of the new opportunities enabled by our separation of business actors Figure 4 1 both for existing business entities and new players Note that players may position themselves anywhere between and PIP and SP For example Player A can operate as a pure PIP like a bit pipe ISP On the other side of the spectrum Player C may decide to focus on its application servi
124. ity and ro bust service guarantees are some examples of areas where innovation is needed 64 More precisely while the network itself has indeed evolved tremendously in terms of size speed new sub IP link technologies and new applications it is the architecture of the public Internet that has mostly remained the same In a sense the Internet is a victim of its own success as its size and scope render the introduction and deployment of new network technologies and services very difficult In fact the Internet core can be considered to be suffering from ossification 48 a condition where technical and technological innovation meets natural resistance Apart from the technical challenges involved in evolving such a large and important system the Core Internet and its inter provider space are in the most challenging environment to for another reason as well because it is a no man s land of re sponsibility Here a connection between a user and a service provider can very well by affected by problems in the network of any provider on the path or in the in terconnection points between any of the providers Often neither the end user nor the service provider has a direct contractual relationship to the provider causing the problem and thus no economic handle to force the trouble causing party to solve the problem For instance in 2008 Level 1 provider Cogent unilaterally stopped peering 45 Chapter 4 A Control Architecture for
125. iven moment This status See Section 2 2 for an introduction of the OpenFlow protocol and messages 29 Chapter 3 Augmenting Commodity Internet Access with Flow Routing information is regularly broadcast to all other controllers via the WDS network We now discus in Section 3 5 related work In Section 3 2 we introduce our experi mental approach and the simulator and describe our testbed Simulator and testbed results using measurement based and synthetic Web traces as input are discussed in Section 3 3 We then summarize our findings in Section 3 6 3 2 Methodology To evaluate the attainable benefit of flow based routing in multihomed environments we combine simulations with real testbed experiments For our evaluation we derive the workload from user traces from the border router of the Munich Scientific Network to capture real user behavior However since it is difficult to capture the reaction of the applications by only replaying traces we also rely on synthetic workloads gen erated by the Web traffic generator Surge 34 This allows us to quantify potential performance improvements as experienced by the users 3 2 1 Flow Routing Strategies To obtain a baseline regarding the potential benefits of flow routing we investigate the following set of basic flow routing strategies Direct the current practice for residential broadband connections every flow is routed on the direct link i e the DSL connection of the use
126. later pTCP 83 is an extension of TCP that enables bandwidth aggregation for multi homed devices The protocol has been evaluated through simulations Its mecha nism is based on packet buffering and appears to us to require a large management overhead Habib et al 80 propose the resurrection of the session layer for striping data from a single connection over several links Implementing the proposal requires extensive changes at the OS or the application level which is also a requirement for SCTP or the IPv6 shim6 layer 31 Recent work by Thompson et al 147 evaluates a framework for end host multi homing with flow routing based on RTT measurements and prediction of the flow sizes The evaluation is limited to a proof of concept system consisting of two nodes and one specific flow routing algorithm Another example of flow management is the work presented by Tao et al 145 They study the feasibility of improving performance by increasing path diversity through flow based path switching This work was evaluated using a wired experimental setup but no evaluation in wireless environments has been reported Papadopouli and Schulzrinne 114 propose the integration of channels with largely different QoS characteristics for serving streams with adaptable bandwidth Their 43 Chapter 3 Augmenting Commodity Internet Access with Flow Routing prototype operates as a multicast application with variable bandwidth Standard application
127. lay debugging None of the mentioned systems provide replay capa bilities for networks In this sense the closest siblings to our work are the classical tools tcpdump and tcpreplay 11 In fact OFRewind uses these tools internally for data plane recording and replay but significantly adds to their scope scalability and coherence It records from a controller domain instead of a single network inter face can select traffic on the control plane and load balance multiple DataStores for scalability and can record a temporally consistent trace of the controller domain Replay debugging based on host primitives Complementary to our network based replay there exists a wealth of approaches that enable replay debugging for end hosts Some systems use instrumentation based on host virtualization technologies to pro vide a controlled environment for recording and then replaying non deterministic events 56 89 Others rely on instrumentation via preloaded libraries 69 or extend the concept to distributed applications and aim to provide a global debugger 68 A common limitation of these systems is that they are unable to trace parallel threads in today s multi core systems which limits their practical use Different approaches have been proposed to overcome this limitation Altekar et al 20 propose to relax consistency requirements during recording and infer causality later According to currently reported results inference times can take up t
128. layers the corporate enterprises which have a given role Furthermore it helps keeping the economic tussles separate from the technical domain Note that both a PIP as well as the VNP deliver a virtualized network Therefore a VNP can act as a PIP to another VNP However one has to keep in mind that a VNP in contrast to a pure PIP has the ability to negotiate contracts with other PIPs and assemble networks 4 1 1 Player Goals and Tasks Before we can discuss the interfaces between the roles we investigate the goals and tasks of each individual player in our infrastructure 48 4 1 Virtualization Business Roles Physical Infrastructure Provider This player seeks to gain a market advantage by maximizing its resource efficiency It can achieve this e g by over booking its resources as well as by optimizing the embedding of VNets to its physical in frastructure The PIP knows its own topology and can migrate virtual network resources as long as this does not violate any service guarantees It also knows the respective resource requirements of each virtual subnetwork assigned to it Its task is the substrate management and thus the realization of the VNets VNet Provider The VNet provider acts as an information broker between PIP of ferings and SP requirements The VNP receives a VNet specification which it may have to transform into multiple sub VNet specifications one for each PIP involved It seeks a competitive advantage by spl
129. le optimal resource utilization and effectively reducing their operational costs and gain a competitive advantage in the market It has been shown that standard networking protocols and mechanisms e g flood based ARP Spanning Tree are no longer sufficient 88 Network operators Network operators have also voiced interest in standardized programmability of network devices for reducing their dependency on specific hard ware vendors reduce operation costs and improve their changes of diversification 146 An emerging class of network architectures addresses these issues They are called split forwarding architectures that enable Software Defined Networks Examples in clude OpenFlow 104 Tesseract 158 and Forces 5 These architectures split the forwarding of traffic on the dataplane off from the decision making about the for warding which happens on the control plane In doing so they enable custom pro grammability and centralization of the control plane while allowing for commodity high throughput high fanout data plane forwarding elements OpenFlow is by far most widely used of these architectures and is discussed in detail here 2 2 1 Overview of OpenFlow OpenFlow is an open protocol that enables custom programmability of the control plane of an Ethernet switch Originally introduced by the Cleanslate Lab of Stanford University 140 and developed by a mixed academic industrial consortium it is now managed by a recently f
130. les residential end users to share their Internet lines in a residential community and profit from statistical multiplexing and the low average utilization of residential Internet access lines In this work we propose a refined flow routing system based on OpenFlow We note that the effort required to deploy such a system drops significantly due to the easily programmable dataplane offered by OpenFlow Furthermore we evaluate several flow re routing strategies for their performance characteristics using synthetic workloads and captured user traces as traffic input Our encouraging results show improvements by up to a factor of 3 in the download times of bandwidth limited flows with very small overhead Bandwidth demanding flows and an unbalanced distribution of load among the users of the sharing community particularly benefit from the flow based routing approach More importantly full knowledge of flow characteristics is not needed as indicated by the performance of MinLargeFlows 44 A Control Architecture for Network Virtualization Leaving the residential and access context we now turn to the core of the Internet and inter provider issues Note that while the Internet still aptly fulfills its current mission as a packet network delivering connectivity service it was also designed with assumptions that no longer describe all current and future requirements Stronger security better mobility support more flexible routing enhanced reliabil
131. ll known remark We regret to inform you but On my way she taught me a hell of a lot including but not limited to deciphering and decod ing her 500 character long perl one liners which are rightfully respected and feared throughout the galaxy Anja you set the bar very high for all the research bosses that will come after you as well as my own future contacts with students and interns thanks a lot Of course taking that journey into science alone would not have been quite so much fun So a big thank you to my collaborators co authors and friends at INET First up Vlad Manilici who got me into this mess in the first place and routed a big number of flows with me sadly before the topic was hot Anyway we knew it back then Merci to Olaf Maennel Gregor Schaffrath and Amir Mehmood who took a stroll with me down Virtual Insanity Lane and shared the depths and shallows of a SIGCOMM hot topic and the associated project and workshop experiences Last but certainly not least in this list Dan Levin my faithful Routerlab padawan of many years and scientific collaborator of the last and wildly most successful year thanks a lot for all the energy and sleep deprivation you invested into transforming 111 the OFRewind project from the mess it was at the beginning of 2010 to its current shiny state Also big cudos to Srini Seetharaman and Rob Sherwood who hosted me during two extended research visits in the Golden State of Cali
132. low table of the switch can be dumped on record startup If recording of the guest net work control and or data traffic is performed Ofrecord transforms the FLOW MOD and PACKET OUT commands sent from the controller to the switch to duplicate the pack ets of selected flows to a DataStore attached to a switch along flow path Multiple DataStores can be attached to each switch e g for load balancing The order of 85 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks flows on the different DataStores in the system is retained with the help of synchro nization markers Any match rule supported by OpenFlow can be used for packet selection Additionally flow based sampling can be used to only record a fraction of the flows Datarecord The Datarecord components located on the DataStores record the selected guest traffic as well as synchronization and control metadata They are spawned and controlled by Ofrecord Their implementation is based on tcpdump modified to be controlled by Ofrecord via a TCP socket connection Data reduction strategies that cannot be implemented with OpenFlow rules e g packet sampling cut offs are executed by Datarecord before writing the data to disk Ofreplay Ofreplay re injects OpenFlow control plane messages as recorded by Ofrecord into the network and orchestrates the guest traffic replay by the Datare play components on the DataStores It supports replay towards the controller
133. lso a single point of failure for the user s Internet experience as a failure of the local access line will prevent the user from accessing any cloud services at all We find Flow Routing to be a viable cost effective approach for communities to share and bundle their access lines for improved reliability and performance with an improvement of up to a factor of 3 in download times shown in our evaluation An Architecture For Network Virtualization Virtual Networks may help improve the innovation speed of the Internet and enable custom control and instru mentation abilities for services across providers For instance they enable a service provider to provide guaranteed Quality of Experience and customize routing and protocol stacks to optimize per application We propose a Control Architecture for Virtual Networks Chapter 4 the first such architecture that targets a multi provider scenario As such our architecture emphasizes the 108 7 2 Future Directions individual business roles and interfaces between the players involved and also considers the business interests of the present stakeholders Mirror VNets Based on Virtual Networks we propose Mirror VNets Chapter 5 which enable safe upgrades and troubleshooting in virtual networks possibly spawning several independent infrastructures To this end a production VNet is paired with a Mirror VNet in identical state and configuration Troubleshoot ing or upgrades can then be pe
134. ly and the MoS value increases again to 4 38 At the same time VNet A is hit hard by the increased traffic causing heavy congestion In consequence the VoIP MoS score drops to 1 45 not recommended At the start of phase 5 the operator switches his production VNet from VNet A to VNet B Note that packet drops as experienced by the end user do not increase noticeably during the switch After the switch is completed the user can profit from the good performance provided by VNet B With phase 6 the operator deactivates VNet A This very simple scenario shows how an operator can benefit from Mirror VNets e g to smoothly upgrade his network configuration to amend a network performance problem Early results indicate that the approach also works for the other use cases mentioned in Section 5 1 3 and that it can scale to larger topology sizes Ongoing evaluation within larger OpenFlow enabled infrastructures that are currently being deployed will provide additional insights into the scalability 5 4 Mirroring Performance To assess the feasibility of network wide Mirror VNets we need to study the perfor mance and isolation provided by current virtualization approaches We now study the mirroring performance utilizing XEN for host virtualization and VLANs for link virtualization To study the limits of the isolation offered by current virtualization techniques we compare multiple options of link attachment and packet duplication 69 Ch
135. ments observed in the testbed The simulator displays some deviations in flow duration which are in part due to the simulator s assumption that bandwidth is shared fairly between flows This assumption is known 35 Chapter 3 Augmenting Commodity Internet Access with Flow Routing http https edonkey pop 3 other probability density Received bytes Figure 3 7 Analysis of the MWN trace PDF of received bytes per application to work well on average but not on smaller time scales As such it is not surpris ing that the size of the deviations decrease as flow durations increase In total the ratio of the durations for bandwidth limited flows in the simulation vs the testbed experiment has a mean of 1 07 and a median of 0 97 This indicates that while for individual flows the predicted performance does not agree with the performance seen in the experiment the overall results of the simulation match the experiment quite nicely We then compare the performance as predicted by the simulator with the performance of the actual experiment using the MinLargeFlows routing policy The simulator reports a mean median improvement for flows longer than 0 5 seconds of 2 59 2 09 In the synthetic Web workload experiment with the same strategy the inter arrival times between Web connections are shorter than with the Direct policy and the load is also higher These predictions match the actually observed benefits of 2 47 very well
136. migration and restoration of any particular experimental setup Physical topology versioning The Labtool keeps track of all custom cabling changes over time and across experiments Versioned cabling enables QoE Lab admin istrators to alter and reliably restore topology changes Boot mode configuration with imager system An experiment performed on one set of devices should be repeatable on another set of suitably similar devices To this end the Labtool allows experimental device configurations for a given device to be redeployed onto any sufficiently similar device The Labtool pro vides a collection of hardware agnostic base operating system images which facilitate quick deployment of experimental environments BERLIN pluggable services for the Routerlab The unified management interface provided by the Labtool allows the Routerlab to offer pre configured combinations of 23 Chapter 2 Background f Obelix Bacteria Dogmatix Asterix Homeopatix Cacofonix Getafix Figure 2 4 Schematic network layout of the Los Altos Testbed hardware and software as higher level pluggable services within the BERLIN frame work These fulfill many common requirements e g traffic generation monitoring and capturing network emulation NetFPGA packet processing and virtualization services These pluggable services allow researchers to quickly establish an exper imental setup with most of the required services from pre built components
137. monitoring capabilities that allow one to dump the traffic of any VLAN on any port to a span mirror port Therefore the online modus allows for direct online investigation and troubleshooting of failures in the sense of a Mirror VNet as discussed in the last chapter When debugging live networks one has to ensure that there are sufficient network resource available for both the network under study as well as the replay target This can be achieved by carefully selecting e g a subset of the traffic for replay In this chapter we focus on reproducing failures in a controlled environment and leave other applications e g online replay for future study 84 6 2 Implementation 6 2 Implementation In this section we describe the implementation of OF Rewind based on OpenFlow selected for currently being the most widely used split forwarding architecture Open Flow is currently in rapid adoption by testbeds 70 university campuses 4 and commercial vendors 6 OpenFlow realizes split forwarding architecture as an open protocol between packet forwarding hardware and a commodity PC the controller The protocol allows the controller to exercise flexible and dynamic control over the forwarding behavior of OpenFlow enabled Ethernet switches at a per flow level The definition of a flow can be tailored to the specific application case OpenFlow supports an 11 tuple of packet header parts against which incoming packets can be matched
138. moval of the requirement for individual negotiations between VNOs and all participating PIPs facilitates the entry of new players into the market Furthermore SPs may outsource non service specific network operation tasks to other entities and thereby concentrate on their core interests relating to their respective business model The migration process is transparent to the VNOs Note that they cannot trigger migra tion directly however by altering their requirements VNOs may indirectly initiate resource migration 4 2 2 VNet Instantiation Setting up a VNet see Figure 4 3 starts from a VNet specification For this we need resource description languages for both the VNet topology including link node properties as well as service level requirements These description languages should neither be too constrained to allow the VNP and the PIPs freedom for optimizations nor too vague to enable a precise specification We note that the language for specifying service level requirement may be service dependent However it should be possible to standardize the VNet topology description language To setup the VNet each player for its domain has to formulate resource require ments discover potential resources and partners negotiate with this partners based on VNet resource description and construct the topology The corresponding com munication is depicted in Figure 4 3 as red dotted arrows Service Provider The SP specifies its
139. n werden k nnen weil die Internet Architektur nur wenige Mechanismen zur Fehlersuche bereitstellt und Werkzeuge wie NetFlow traceroute und tcpdump entweder nur grobk rnige statis tische Informationen liefern oder auf einen einzigen Beobachtungspunkt beschr nkt sind und kein konsistentes Bild des Netzwerkes liefern k nnen In dieser Dissertation untersuche ich wie die Kontrolle ber unsere Netze und unsere F higkeit zur Problemfindung und behebung verbessert werden kann Wegen der gro en Bandbreite der unterschiedlichen Umgebungen suche ich dabei nicht nach einer alles umfassenden Einheitsl sung Statt dessen schlage ich mehrere Ans tze vor die auf spezifische relevante Szenarien und Umgebungen zugeschnitten sind Ich konzentriere mich auf netzwerk zentrische L sungen die lokal implementiert werden k nnen und f r die Endger te transparent sind Im Sinne des Internet Credos nur Jaufendem Code zu vertrauen wurden die untersuchten Ans tze auf dem Blech implementiert und in echten Netzen evaluiert vii Zuerst untersuche ich das Potential von Flow Routing einem Ansatz mit dem End Benutzer die Zuverlassigkeit und Geschwindigkeit ihres Internet Anschlusses selbst verbessern k nnen Die Ergebnisse zeigen dass Flow Routing eine sinnvolle kosten effiziente M glichkeit sein kann Internet Anschl sse in Gruppen zu teilen und zu verbinden und damit Zuverl ssigkeit und Geschwindigkeit zu verbessern Im gr eren
140. nals Datareplay to continue with a sync_ok message Datareplay outputs the packet to the switch This generates a PACKET IN event Ofreplay responds with the matching FLOW MOD event from the log This installs a matching flow rule in the switch and causes the flow to be forwarded as recorded 6 2 Implementation 6 2 3 Discussion We now discuss the limitations imposed by OpenFlow on our implementation and best practices for avoiding replay inaccuracies OpenFlow limitations While OpenFlow provides a useful basis for implementing OFRewind it does not support all the features required to realize all operation modes OpenFlow does not currently support sampling of either flows or packets Thus flow sampling is performed by Ofrecord and packet sampling is performed by Datarecord This imposes additional load on the channel between the switches and the DataStores for data that is not subsequently recorded Similarly the OpenFlow data plane does not support forwarding of partial packets Consequently full packets are forwarded to the DataStore and only their headers may be recorded OpenFlow also does not support automatic flow cut offs after a specified amount of traffic The cut off can be performed in the DataStore Further optimizations are possible e g regularly removing flows that have surpassed the threshold Avoiding replay inaccuracies To reliably reproduce failures during replay in a con trolled environment one must
141. ned Networks OpenFlow Figure 2 2 Example of a message exchange in an OpenFlow enabled network enabled switches of swi of sw2 and of sw3 They are all managed by the con troller of ctrl via the OpenFlow protocol blush dotted lines Each of the switches has two attached clients called c1 through c6 Initially the only preset rules are for ARP Now c1 wants to communicate with c5 c1 s first packet triggers on arrival at of sw1 an OpenFlow PACKET IN message which is sent to the controller depicted by the arrow marked 1 If the controller decides to instantiate a flow it sends a FLOW MOD message to the switches of sw1 2a of sw2 2b and of sw3 2c The FLOW MOD message consists of a match and an action part The match part is responsible for selecting packets going from c1 to c5 by some means e g source and destination IP addresses or MAC addresses The action part directs the matched packets to port 1 3 message 2a 2 3 2b and 3 1 2c respectively Thus packets from this flow are sent from c1 via of swi of sw2 and of sw3 The reverse direction is either setup independently when packets arrive at of sw3 for c1 from c5 or alternatively the controller can decide to setup this path proactively When the flow becomes idle or times out the switch removes the entry from the flow table and sends a FLOW EXPIRED message to the controller This message contains summary statistics about the completed flow 2 2 3 Existin
142. ned Networks OpenFlow Table 2 2 Overview of popular OpenFlow switch implementations as of 05 2011 Implementation Type Target Protocol flows exakt wildcard Reference Software Reference Platform 1 0 655365 1008 OpenVSwitch Software Product 1 0 ot NetFPGA Hardware Experimental Platform 1 0 32 000 100 Broadcom Hardware Reference Platform 1 0 2 048 HP Procurve 5400 Series Hardware prototype for product 1 0 1500 NEC IP 8800 Hardware supported as product 1 0 3072 Mixed flow table can contain both wildcarded and non wildcarded flows Software limit can be changed through recompilation OpenVSwitch handles all wildcard flow entries in user space and adds caching exact flow entries into kernel space 2 2 4 Existing Switch Implementations In this section we discuss present several current OpenFlow switch implementations including two software based implementations Reference OpenVSwitch and four hardware based implementations NetF PGA BroadComRef HP NEC Table 2 2 gives an overview Other companies have announced plans to support OpenF low OpenFlow reference implementation A reference implementation of OpenFlow is maintained by Stanford university It contains a software switch implementation built in user space Running on various Linux based devices in the network this currently is the most widely used switch implementation of OpenFlow It has also been ported to run on OpenWRT based wi
143. networks use redundant links for fault tolerance As loops in the active Ethernet topology can cause broadcast storms that make the network dys functional the Spanning tree protocol STP is used to discover a loop free subgraph to be used STP periodically sends specific datagrams Bridge Protocol Data Units BPDU for legacy networks or Link Layer Discovery Protocol LLDP packets for OpenFlow enabled networks to learn about existing links and thus about possible loops STP heavily depends on the correct forwarding of these special datagrams Incorrect handling can lead to STP convergence problems In the Stanford Open Flow deployment two such variations have been encountered a legacy switches dropping the LLDPs and b OpenFlow switches dropping the BPDUs 92 6 3 Case Studies 1007 90 807 707 Original Replay 50 CPU usage 40 30 20 10 10 10 Time elapsed secs Figure 6 6 Broadcast storm case study Time series of CPU utilization during the replay of a broadcast storm in networks where STP does not converge The CPU spikes are out of sync because of non determinism in the switch backoff period while connecting to the controller We show how we are able to reproduce case a in the experimental network When the LLDPs are dropped by a legacy switch the controller becomes oblivious to the loop Thus a subsequently arriving broadcast ARP packet causes a br
144. nford production network of four switches with one DataStore each a 9 hour day period on a workday in July 2010 generated cr 3 891 899 OpenFlow messages that required synchronization During that period we observed 87 977 GB 100 6 4 Evaluation of record Vendor A A of record data Vendor A re S _ of simple Vendor A a a x of record Vendor B E _ of record data Vendor B oo Fu A v of simple Vendor B ee gt o I HE a LO m Nn r 2 ofA 4 LL Pa 3 7 Va a 7 y AS v 5 10 20 50 100 200 500 2000 5000 Flows sent s Figure 6 10 Switch performance Mean rate of flows sent vs successfully received with controllers ofrecord ofrecord data and of simple and switches from Vendor A and B of data plane traffic Thus the overall relative overhead is O e 1 13 small enough to not impact the capacity and allow scaling up the deployment to a larger number of DataStores 6 4 4 End to End Reliability And Timing We now investigate the end to end reliability and timing precision of OF Rewind by combining Ofrecord and Ofreplay We use minimum size flows consisting of single UDP packets sent out at a uniform rate to obtain a worst case bound We vary the flow rate to investigate scalability For each run we first record the traffic with Of record in guest mode with flow sync markers enabled Then we play back the trace and analyze the end to end drop rate and timing accuracy We use a two server
145. ng all non deterministic events Note that the necessary coordination and transaction modules inside the Hypervisor add significant complexity to the production datapath and thus cannot be fully transparent to the production network Numerous other approaches for improving troubleshooting support in networks have been proposed Some authors 26 67 propose adding pervasive tracing support throughout the net work which is difficult because it requires changes to all involved hosts routers and software stacks Active probing has been proposed for fault localization at the network layer For example Badabing 139 and Tulip 96 measure per path characteristics including loss rate and latency to identify problems that impact perceived performance Au tomatic inference 16 32 125 can be used to detect problems profile applications and in some cases infer root causes from traces collected by network monitoring Gupta 78 with DieCast suggest to scale down physically large scale distributed systems and map them to smaller virtualized testbeds They combine Time Dila tion 79 disk I O simulation and of the shelf system virtualization technologies e g XEN 35 to run the system at slower pace with reduced hardware resources Note that sporadic problems or problems induced by unforeseen user behavior remain challenging to reproduce in a testbed A complementary approach 87 is to use virtualization to improve bug tolerance in software rou
146. ng for Networks We propose and evaluate OF Rewind the first system that enables practical record and replay in operational networks even in the presence of black box devices than cannot be modified or instrumented We present several case studies that underline its utility Our evaluation shows that OFRewind scales at least as well as current controller implementations and does not significantly impact the scalability of an OpenFlow controller domain In summary we propose several simple but effective scenario specific and network centric approaches that improve the control and troubleshooting of Operational Net works from the residential network and access line to the datacenter Our approaches have all been implemented and evaluated on real networks and can serve as a data point and guidance for how networks may need to evolve to cater to their growing importance vi Zusammenfassung Wahrend des letzten Jahrzehnts haben Netzwerke und besonders das Internet als Netz der Netze in hohem Ma e an Bedeutung gewonnen Gleichzeitig ist auch ihre Geschwindigkeit und ihre Ausdehnung stark gewachsen Dieser Trend wird sich absehbar fortsetzen Heute bereits wandern mehr und mehr Dienste vom lokalen PC in die Cloud zum Beispiel Daten Sicherungen aber auch Office Applikationen Dadurch wird die Zuverl ssigkeit der Netze f r unser t gliches Leben immer wichtiger Trotz alledem sind bis heute unsere M glichkeiten diese Netze sic
147. nism e g cryptographic nonces application specific handlers must be used It does support a cut off for packets forwarded to the controller 3Expiration after a specified amount of time is supported 89 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Case study Class OF specific Switch CPU Inflation black box switch no Anomalous Forwarding black box switch yes Invalid Port Translation OF controller yes NOX Parsing Error OF controller yes Faulty Route Advertisements software router no Table 6 2 Overview of the case studies When the failure observed in the production network does not appear during replay we call this a false negative problem When the precautions outlined above have been taken a repeated false negative indicates that the failure is likely not triggered by network traffic but other events In a false positive case a failure is observed during replay which does not stem from the same root cause Such inaccuracies can often be avoided by careful comparison of the symptoms and automated repetition of the replay 6 3 Case Studies In this section we demonstrate the use of OF Rewind for localizing problems in black box network devices controllers and other software components as summarized in Table 6 2 We examine two switch problems switch CPU inflation 6 3 2 and anomalous forwarding 6 3 4 two controller problems invalid port translation 6 3 5 and NOX
148. o hundred times the dura tion of the actual runs Others rely on hardware assistance for high performance parallelism support 82 106 which incurs little overhead but limits deployment DCR 21 a recent approach emphasizes the importance of the control plane for debugging These systems provide fully deterministic replay capabilities important for debugging complex end host systems Parallelism remains a challenging problem and they typically cannot be used for black box network components Automated problem diagnosis A deployment of OF Rewind can be complemented by a system that focuses on automated problem diagnosis There exist approaches that detect problems in distributed systems by distributed checking of predicates The online checker D S by Liu et al 94 allows developers to specify predicates regarding the state of the distributed system under study These are then checked 104 6 6 Summary while the system is running D3S uses binary instrumentation to avoid modifying the software and collects global snapshots of the state While powerful binary instrumen tation adds non trivial complexity and is limited in scale Pip 124 is an example of another class of systems that trace the behavior of a running application and checks that behavior against programmer expectations and enables the programmer to then examine the resulting valid and invalid behavior Other systems aim at diagnosing problems in networks using inference
149. o locating OpenFlow specific bugs alone but can also be used to reproduce other network anomalies Our evaluation Section 6 4 shows a that the tool scales at least as well as current OpenFlow hardware implementations b that recording does not impose an undue 76 6 1 OFRewind System Design performance penalty on the throughput achieved and c that the messaging over head for synchronization in our production network is limited to 1 13 of all data plane traffic Key Observations While using our tool we have made and incorporated the following key observa tions I A full recording of all events in an entire production network is infeasible due to the data volumes involved and their asynchronous nature However one usually needs not record all information to be able to reproduce or pinpoint a failure It suffices to focus on relevant subparts e g control messages or packet headers By selectively recording critical traffic subsets we can afford to turn recording on by default and thus reproduce many unforeseen problems post facto Il Partial recordings while missing some data necessary for fully deterministic replay can be used to reproduce symptomatic network behavior useful for gaining insights in many debugging situations With careful initialization the behavior of many network devices turns out to be deterministic with respect to the network input Ill By replaying subsets of traffic at a controlled pace
150. oadcast storm pushing the CPU usage of the switch which does not enforce strict CPU isolation to hit 100 Figure 6 6 shows the CPU utilization while the failure occurred as well as during replay 4 We start our troubleshooting by turning off OpenFlow on of sw1 effectively trans forming it into a legacy switch and thus creating a loop in the network triangle between of sw1 of sw2 and of sw3 Then we only replay the non FLOW MOD control messages The loop in this run is not triggered as any broadcast traffic is buffered and then dropped However once we include the FLOW MOD messages the FLOOD action rule causes the broadcast ARP traffic to be forwarded forever As this forwarding is currently done by the CPU this causes the CPU utilization spike and imposes a denial of service attack for all other flows By making this OF Rewind test case part of a regression test suite we can now avoid broadcast storms in production networks Further this test case can also be used to verify any new switch software release and in particular to test the convergence of STP The original run and the replayed one occurred at two different time instances separated by 10 minutes 93 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Counts Match duration 181s in_port 8 n_packets 0 dl_type arp n_bytes 3968 dl_src 00 15 17 d1 fa 92 idle_timeout 60 al_dst FE Effi ff hard_timeout 0 actions FLOOD T
151. of any end hosts datafull In this mode data traffic recorded by the DataStores is replayed with complete payload allowing for selective inclusion of end host traffic into the tests In addition to these operation modes Ofreplay enables the user to further tweak the recorded traffic to match the replay scenario Replayed messages can be sub selected based on source or destination host port or message type Further message desti nations can be re mapped on a per host or per port basis These two complementary features allow traffic to be re targeted toward a particular host or restricted such that only relevant messages are replayed They enable Ofreplay to play recorded traffic either toward the original sources or to alternative devices which may run a different firmware version have a different hardware configuration or even be of a different vendor These features enable OFRewind to be used for regression testing Alternately it can be useful to map traffic of multiple devices to a single device to perform stress tests In addition the pace of the replay is adjustable within Ofreplay enabling investiga tion of pace dependent performance problems Adjusting replay can also be used to fast forward over portions of a trace e g memory leaks in a switch which typically develop over long time periods may be reproduced in an expedited manner 82 6 1 OFRewind System Design 6 1 6 Event Ordering and Synchronization For
152. of proposing practically feasible solutions and keeping with the Internet credo of running code our approaches have all been practically implemented on the metal in least in a prototypical fashion and evaluated on real networks OF Rewind has spawned interest in the OpenFlow community as a production tool and may be extended to a production ready open source project in the near future 7 2 Future Directions Gaining more experience with our approaches in larger scale deployments such as the OpenFlow campus deployments in the US and Europe 4 as well as large scale experimental networks such as GENI 70 is one of the main challenges for the near The VNet Control Architecture is being further refined implemented and evaluated in ongoing separate work 109 Chapter 7 Conclusion and Outlook future As the deployments of the underlying enablers Virtual Networks and Soft ware Defined Networks grow further beyond their current state our troubleshooting and instrumentation approaches will have to grow with them This growth will entail further scalability challenges e g when OF Rewind runs in a large scale OpenFlow network controlled by a distributed controller While we have presented an analy sis of the theoretical scalability properties we are convinced that further practical challenges will emerge once such deployments exist at scale There exist a multitude of trade offs in the area of Software Defined Networks that
153. on in vnets In Proceedings of the ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures VISA 2010 VISA 10 pp 17 24 BLACKFORD R Try the blue pill What s wrong with life in a simulation In Jacking in to the Matrix franchise cultural reception and interpretation New York NY 2004 M Kapell and W G Doty Eds Continuum International Publishing pp 169 171 BYCHKOVSKyY V HULL B Miu A K BALAKRISHNAN H AND MADDEN S A Measurement Study of Vehicular Internet Access Using In Situ Wi Fi Networks In MOBICOM 2006 CBench Controller Benchmarker www openflowswitch org wk index php Oflops CHANDRA R BAHL V AND BAHL P Multinet Connecting to multiple IEEE 802 11 networks using a single wireless card In Proceedings of the IEEE Annual Inter national Conference on Computer Communications INFOCOM 2004 CHANDRASEKARAN S AND FRANKLIN M Remembrance of Streams Past Overload sensitive Management of Archived Streams In Proceedings of the Thirtieth interna tional conference on Very large data bases VLDB 2004 CHOWDHURY N RAHMAN M AND BOUTABA R Virtual network embedding with coordinated node and link mapping In INFOCOM 2009 IEEE april 2009 pp 783 791 Cisco Inc Secure Domain Router Commands on Cisco IOS XR Soft ware http www cisco com en US docs ios_xr_sw iosxr_r3 4 system_management command reference yr34sdr html CLARK C FRASER K H S HAN
154. onality offered by OpenFlow 5 1 2 Approach To upgrade or troubleshoot a production VNet VNet A e g in Figure 5 1 the operator clones it and pairs it with a parallel Mirror VNet VNet B Thus VNet B starts with the identical configuration and state as VNet A e g by relying on the same techniques as used for network node migration The operator ensures that the input traffic for VNet A is mirrored either completely or in part to VNet B This has to happen at all attachment points between the VNet and external entities e g end systems or network entry points All user traffic traverses both VNets however only traffic from the production VNet A is send back to external nodes Traffic from the Mirror VNet B is discarded silently Both VNets A and B now operate in parallel Moreover they are fully isolated from each other on a node and link level Thus from now on they operate independently but under the same or partial user traffic This means that it is now possible to use VNet B to troubleshoot network problems test a new software or hardware release or reconfigure the network Once the problem has been diagnosed and a solution has been found deployed to the Mirror VNet B and validated the Mirror VNet B can be upgraded to become the new production VNet To this end the VNet attachment points of both VNets to external hosts are swapped External hosts now communicate with VNet B and 61 Chapter 5 Safe Evolution and Impro
155. onferences cloud based backup services like Dropbox 55 or uploads to social media sites In effect the data rates provisioned by broadband Internet access connections can continue to fall short of the requirements posed by emerging applications Thus it is attractive e g for a small business to combine several commodity access lines to optimize performance and availability Moreover the average utilization of a residential Internet connection has been shown to be low 98 111 This indicates that there is potential to statistically optimize 26 the performance and availability of residential Internet access by sharing Internet access lines between users in a residential community Due to prevalence of flat rate tariffs for end users no financial compensation may be required for such a scheme In summary statistical multiplexing of user traffic across multiple broadband ac cess connections over a shared wireless medium can be used to improve availablil ity increase the peak data rates and satisfy high instantaneous traffic demand of bandwidth intensive applications However combining or sharing commodity Internet lines is not trivially achievable as realities of current network infrastructure design and operation pose challenges For instance commodity Internet customers do not have the option to act as a multi homed autonomous system and participate in inter AS routing to leverage Internet Routing techniques for availability and
156. or B switch is CPU limited and the additional messages created by Of record result in reduced flow rates ofrecord 247 flows s ofrecord data 187 when compared to of simple 393 flows s Vendor A switch does not drop flows up to an ingress rate of 400 flows s However it peaks at 872 flows s for ofrecord data 972 flows s for ofrecord and 996 flows s for of simple This indicates that introducing Ofrecord imposes an acceptable performance penalty on the switches 6 4 3 DataStore Scalability Next we analyze the scalability of the DataStores Note that Ofrecord is not limited to using a single DataStore Indeed the aggregate data plane traffic T bytes in cr flows can be distributed onto as many DataStores as necessary subject to the number of available switch ports We denote the number of DataStores with n and enumerate each DataStore D subject to 0 lt i lt n The traffic volume assigned to each DataStore is T such that Ts X T The flow count on each DataStore is Cy The main overhead when using Ofrecord is caused by the sync markers that are flooded to all DataStores at the same time Thus their number limits the scalability of the system Flow sync markers are minimum sized Ethernet frames that add constant overhead 9 64B per new flow Accordingly the absolute overhead for each DataStore is 0 ci The absolute overhead for the entire system is O gt gt 0 0 cp the relative overhead is Oe as In the Sta
157. ormed non profit organization the Open Networking Foundation 112 The main idea of OpenFlow is to add a standardized programmable API to a com modity Ethernet switch This interface exposes the forwarding table of the switch to an external controller OpenFlow controller applications can then assume control of the forwarding process by issuing flow based commands Thus they can e g optimize traffic flows for load balancing or security policy The actual forwarding is still done in hardware on the switch Consider the architecture of a classical smart or enterprise switch as depicted in Figure 2 1 a It typically consists of 1 At least one forwarding table typically built out of TCAM Ternary content addressable memory This flow table can map incoming packets to output 17 Chapter 2 Background OpenFlow Protocol Controller Forwarding Table TCAM ja e a aa a Classical switch b OpenFlow enabled switch Figure 2 1 Comparison of schematic switch architectures with and without OpenFlow actions in constant time Historically switches based their forwarding exclu sively on the Destination MAC address but recent models also support other attributes like VLAN tags and even higher layer attributes like IP addresses 2 This flow table is managed by an embedded system running on the switch that installs and removes entries This system is typically configured via CLI SNMP or a w
158. orwarding rate in native Linux group 1 and Dom0 group 2 Native Linux Debian 2 6 18 6 supports a median forwarding rate of 840 kpps Interestingly the XEN kernel performs better when doing native unbridged forwarding in Dom0 939 9 kpps Next we introduce the soft bridge that is required for internal attachment of the DomUs but still keep the forwarding in Dom0 We notice that the performance drops to 522 kpps We then switch to option a by delegating the forwarding to DomU via a soft bridge third phase Notice that the forwarding performance drops to 215 kpps even without monitoring After enabling mirroring forwarding performance is further reduced to 70 5 4 Mirroring Performance Linux Dom0 DomuU bridge DomU pci direct o S q a oe N Tea E A O y 1 i i 1 00 1 i 1 o q a yt 1 seJ a o E E C os a Q 0 oe A A l 2 Ea 3 i A E od i T T T T T T T T jo ze o D 0 o jo Cc oO oO Cc Cc E o amp 3 D o S S Z 2 PA 2 3 2 o Y a lo E E 2 an EE O E 2 E o E Figure 5 8 Boxplot of forwarded packets packets second for 64 byte packets with and without Mirroring 180 kpps which indicates that network performance isolation is a problem in this setup Next we study option b directly attaching the DomU interface to the NIC via pcidirect group 4 in the figure There is hardly any performance degradation Indeed we see a performance improvement wit
159. owski et al 39 provide an optimal offline algorithm for service migration and competitive migration strategy 4 to be able to manage the above process efficiently and debug it This is one aspect addressed by this thesis In summary Virtual Networks combine system and link virtualization techniques They are considered enablers for scalable experimentation with and incremental de ployment of network innovations A number of challenges including performance management and debugging are still under active investigation 2 2 Software Defined Networks OpenFlow As discussed in the last section virtualization in network components has so far often lacked the programmability aspect Virtualized routers typically only provide configuration isolation between multiple guests Ethernet VLANs and MPLS tun nels are available but also provide limited customization It is possible to build custom network components from commodity PCs in software e g 59 or from flexible FPGA based experiment hardware like NetFPGA 95 but these solutions are constrained in performance scale and cost and power efficiency For instance PC servers require high performance CPUs for multi Gigabit dataplane forwarding that are expensive and consume significant power Typically a network optimized server can provide about 6 8 Gigabit network ports per rack height unit In con trast a commodity switch provides full cross section bandwidth between its ports and ty
160. pically provides 48 ports per height unit Recent years have seen increased interest in custom programmable scalable network hardware driven by the requirements of large scale data centers researcher seeking scalable experimental evaluation and Internet providers Scalable experimental evaluation Researchers have put forward many new pro posals for improving the Internet e g in Future Internet initiatives 15 It has been recognized that these proposals are not widely adopted unless they can be practi cally evaluated at scale This has been a problem in network research so far Custom hardware is typically prohibitively expensive to build for a research project while software solutions often do not scale to large enough systems This drives the demand for testbed components that share some of the properties of commercial commodity hardware high line rates high fan out affordable pricing with some of the flexi bility afforded by software based testbeds ability to try custom protocols quickly innovate 16 2 2 Software Defined Networks OpenFlow Data centers Another push for increased flexibility in Operational Networks comes from the operators of big data centers These data centers often contain several 10 000 servers and experience highly differentiated specific network workload pat terns e g induced by the Map Reduce pattern As such their operators are highly interested in flexibly controlling their networks enab
161. prin ciples alone Over provisioning as the sole instrument of ensuring quality and reli ability might not work in a world of streamed HD content and decreasing operator revenues it is possible that the Internet may have to find a new sweet spot in this continuum 110 Acknowledgments This is the end of the thesis the end of my time in Berlin and at INET Time to say thank you to a lot of people more than fit on a good page Not once during my diploma studies did I consider continuing for a Ph D and going into research Now I am submitting my thesis and moving to California for a Post Doc stipend apparently something in between must have changed my mind It was quite frankly the atmosphere at INET completely unlike anything I had seen at a German university before Energetic competitive opinion strong always willing to take it out for the better arguments Shooting high playing with the big U S kids and occasionally getting our backs kicked by them A wholly nerve wrecking and inspiring place to work The person to thank for this environment is first and foremost my advisor Anja Feldmann who is totally open about the how and where but never fails to chal lenge and question the results After all in spite of appearances she can always be persuaded by good arguments And most importantly she never fails to provide the crucial positive reinforcement when another hard worked submission comes back with the oh so we
162. property is crucial to the viability of the proposal as it ensures the protection of business interests and competitive advantages Furthermore our architecture encompasses other proposed network virtualization architectures e g GENI and Cabernet 70 161 In support of this flexible resource management strategy we emphasize the need for an Out of VNet access management interface to allow some basic control of virtual nodes from the outside of the VNet 58 Safe Evolution and Improved Network Troubleshooting with Mirror VNets Armed with Virtual Networks as introduced in the last chapter we now turn our focus from control to troubleshooting and investigate how Virtual Networks can improve our troubleshooting abilities Recall that today diagnosing problems deploying new services testing protocol interactions or validating network configurations are still largely unsolved problems for both enterprise and Internet Service Provider ISP networks Due to the intrinsically distributed nature of network state frequent timing dependencies and sources of non determinism involved any change may introduce undesired effects even the impact of a simple configuration change can be hard to predict As such diagnosis is often attempted in artificial environments analytical models simulators testbeds that offer good monitoring capabilities or in a trial and error fashion in the actual production environment However these approaches
163. r VNP which is responsible for assembling virtual re sources from one or multiple PIPs into a virtual topology 47 Chapter 4 A Control Architecture for Network Virtualization Figure 4 1 VNet management and business roles Virtual Network Operator VNO which is responsible for the installation and op eration of a VNet over the virtual topology provided by the VNP according to the needs of the SP and thus realizes a tailored connectivity service Service Provider SP which uses the virtual network to offer its service This can be a value added service and then the SP acts as a application service provider or a transport service with the SP acting as a network service provider These various business roles lead to the architectural entities and organization de picted in Figure 4 1 In principle a single company can fill multiple roles at the same time For example it can be PIP and VNP or VNP and VNO or even PIP VNP and VNO However we separate the roles as they are typically performed by distinct groups even in companies that aggregate multiple roles For example running an infrastructure is fundamentally different from negotiating contracts with PIPs about substrate slices This in turn is fundamentally different from operating a specific network e g an IP network for a service provider which is the task of the VNO As such splitting the roles increases our flexibility and facilitates identification of the p
164. r originating the flow FatPipe the ideal case it bundles all DSL links into one fat pipe with bandwidth equal to the sum of the capacities of the individual connections The only restriction is that no flow may exceed the bandwidth of the originating DSL connection This strategy cannot be implemented in a real network and is only supported by the simulator MinLargeFlows a first algorithm it tries to minimize the number of bulky flows that share any of the DSL links Therefore it assigns each new flow to the link which at the time the flow arrives carries the lowest number of flows that have already transmitted some number of bytes say 8 KB Moving flows from one link to another is difficult as it requires either support by all end systems or transparent movement of the TCP state Therefore we do not allow in any algorithm re routing a flow once it has been assigned to a certain link 30 3 2 Methodology 5 m Testbed o Simulator Do 2 a jo o gt D o p S w s O N Sor E Oo o 0 500 1000 1500 time Figure 3 3 Comparison simulator vs testbed Normalized link utilization direct routing 3 2 2 Flow Routing Testbed FlowRoute A testbed for conducting realistic experiments has been deployed at our site emu lating the setup in Figure 3 1 Four nodes have been deployed on one floor in our building coexisting with other wireless networks as in r
165. ractical approaches that take into account the realities of networking and lend themselves to migration strategies We opt for a network centric approach We believe that while end host centric trou bleshooting and control techniques have been been intensively studied and improved substantially in recent years the network as such has been under investigated and underdeveloped so far More and more such services are moving to distributed network based models and subsequently have to deal with the failure modes and challenges inherent to networks As such concise instrumentation and troubleshooting abilities in the network will grow even more in importance 1 2 Challenges for Network Troubleshooting Why is network troubleshooting challenging and not a solved problem in practice Some of the challenges are intrinsic to the characteristics of networks including their distributed state their speed scale and geographical spread Other challenges are created by the characteristics of the prevalent Internet architecture and its base assumptions Also organizational and economical influences play an important role in steering or inhibiting network innovation Chapter 1 Introduction Challenges intrinsic to networks A number of challenges associated with troubleshooting operational networks are intrinsic to the nature of networks themselves Distributed state First and foremost a network is a distributed system with dis tributed
166. rastically is that continuous recording may be enabled and thus help locate unexpected failures 6 1 5 Ofreplay Operation Modes To support testing of the different entities involved switches controller end hosts and to enable different playback scenarios Ofreplay supports several different oper ation modes as summarized by Table 6 1 81 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Name Target Traffic type ctrl Ctrl OF msgs switch Switch OF msgs datahdr Switch OF msgs data plane traffic from headers datafull Switch OF msgs full data plane traffic Table 6 1 Ofreplay operation modes ctrl In this operation mode replay is directed towards the controller Ofreplay plays the recorded substrate control messages from the local storage This mode enables debugging of a controller application on a single developer host without need for switches end hosts or even a network Recorded data plane traffic is not required switch This operation mode replays the recorded substrate control messages toward the switches reconstructing each switch s flow table in real time No controller is needed nor is guest traffic replayed datahdr This mode uses packet headers captured by the Datarecord modules to re generate the exact flows encountered at recording time with dummy packet payloads This enables full testing of the switch network independent
167. referred over traffic on behalf of other users Forwarded traffic can be prioritized based on the account balance We leave further investigation of such schemes for future work 41 Chapter 3 Augmenting Commodity Internet Access with Flow Routing 3 4 3 Interconnection speed As the speed of commodity Internet access lines continues to improve the wire less interconnection between the participants may become the bottleneck that limits the performance of forwarded traffic This may be avoided by wired interconnec tions e g Gigabit Ethernet between the participating routers still an order of magnitude faster than the highest bandwidth available commodity Internet offer ings Alternatively one can limit the amount of traffic that is forwarded This can be achieved by restricting forwarding to situations of significant congestion or failure of the local access line 3 4 4 Unaffected scenario Issues with legal aspects or fairness and the capacity of the interconnection medium can reduce the viability and performance of Flow Routing when access lines are shared over a wireless link between multiple entities We have discussed approaches to limit the impact of these issues Note however that there is a useful scenario for Flow Routing in which they do not apply at all When a single entity e g a small business uses Flow Routing to take advance of a diverse set of access lines for improved reliability and performance This may inde
168. reless access points OpenVSwitch OpenVSwitch 113 115 is another software based switch It is an advanced reimplementation of the standard Linux software bridge to bring it en par with e g Sun s ProjectCrossbow for Solaris 144 Features include support for OpenFlow VLANs SFlow NetFlow and channel bonding It is developed by Nicira and released under GPL It aims to be production quality software It supports OpenFlow version 1 0 Broadcom reference implementation Based on the Broadcom Firebolt chipset a reference hardware switch implementation is built by the consortium According to the consortium it is targeted for research use and as a baseline for vendor imple mentations but not for direct deployment 134 It supports version 1 0 HP Procurve HP has a prototype implementation of OpenFlow for their ProCurve series of switches It currently supports version 1 0 2A kernel based implementation has been dropped due to resource constraints 21 Chapter 2 Background Router Oriented Part Switch Oriented Part Teaching Cleanslate experiments AS oriented experiments interconnections with projects 5 Y Figure 2 3 Schematic Network Layout of the FG INET Routerlab NEC IP 8800 NEC offers the model IP 8800 It provides line rate support for OpenFlow and is supported as a product It too supports OpenFlow version 1 0 Other production switches have been announced 2 3 Testbeds We now present
169. rence with the outcome of the computation Performance Isolation guarantees that there is no impact on the performance of other guests Transparency In some cases virtualization also entails transparency This means that the virtualization guest does not have to know it is being virtualized but can instead continue to use the resource as if it fully owned it Examples include virtual memory where an application can typically rely on being able to transparently access a memory location even when the accessed memory location has been paged out to disk The relevant virtualization services e g on demand allocation mapping to physical hardware paging from to background storage are being transparently performed by the hardware or the operating system On demand provisioning overbooking In many virtualization scenarios it is pos sible to lazily provision resources only when they are actually needed and thus over book resources to optimize statical resource consumption For instance many sys tem virtualization systems provide the option to provision storage only as it being allocated Migration Another typical benefit of virtualization is that virtual resources can be quickly moved and or transparently migrated between physical host resources For example virtual memory allows to change mapping between virtual and physical memory without affecting the virtual memory layout of the process Some system virtualization products
170. rformed safely in the Mirror VNet without af fecting the production VNet We present a prototype implementation and a case study in quality of experience scenario We find that Mirror VNets work well if the underlying virtualization layer offers good isolation Control Plane Record and Replay with OFRecord We propose OFRewind Chap ter 6 the first system that leverages the flexibility of Software Defined Net works to enable practical Record and Relay troubleshooting in networks even in the presence of black box devices than cannot be modified or instrumented We describe the design and implementation of the system present several case studies that underline its utility for both OpenFlow and non OpenFlow com ponents among them switch blackbox malfunctions controller bugs and an IP router problem We evaluate its scalability and find that OFRewind scales at least as well as current controller implementations and does not significantly impact the scalability of an OpenFlow controller domain In our work we prefer network centric approaches More specifically we refrain from proposing pervasive approaches that modify many layers in the stack because of the associated deployment hurdles In a similar vein we emphasize approaches that work with unmodified end hosts and software as far as possible This enables our approaches to work in the presence of closed source software and black box devices a reality in networks today In the spirit
171. rks Facebook linkage patterns in the 2008 u s presidential election In Proceed ings of the Annual International Conference on Digital Government Research Social Networks Making Connections between Citizens Data and Government 2009 dg o 09 pp 6 15 RODRIGUEZ P CHAKRAVORTY R CHESTERFIELD J PRATT I AND BANERJEE S MAR a commuter router infrastructure for the mobile internet In Proceedings of the The International Conference on Mobile Systems Applications and Services MobiSys 2004 RoE C AND GONIK S Server side design principles for scalable Internet systems IEEE Software 19 2 mar apr 2002 34 41 RUSSELL A rough consensus and running code and the internet osi standards war Annals of the History of Computing IEEE 28 3 july sept 2006 48 61 SCHULZ ZANDER J ZHU J AND YIAKOUMIS Y OpenFlow 1 0 for OpenWRT http www openflow org wk index php OpenFlow_1 0_for_OpenWRT SHANMUGASUNDARAM K MEMON N SAVANT A AND BRONNIMANN H ForNet A Distributed Forensics Network In Proceedings of the Workshop on Mathematical Methods Models and Architectures for Computer Networks Security 2003 SHERWOOD R An Experimenter s Guide to OpenFlow In GENI Experimenters Workshop 2010 SHERWOOD R CHAN M COVINGTON G A GIBB G FLAJSLIK M HAND IGOL N HUANG T Y KAZEMIAN P KOBAYASHI M NAous J SEETHARA MAN S UNDERHILL D YABE T YAP K K YIAKOUMIS Y
172. rocess are limited to the Mirror VNet Thus they do not affect the production network Moreover the entire change set is tested under realistic conditions before affecting production 63 Chapter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets Real user traffic Mirror VNets expose the new system and its configuration to real user traffic at full scale and thus offer the opportunities to detect more bugs earlier Complex setups Some problems can only be reproduced in complex setups which can not be reproduced with models simulations or in test labs The only way to test under real world conditions is to deploy in a real network however mirror VNets enable us to do this in a safe manner without impacting the reliability of the production network Rollback undo for networks If after being set into production an upgraded Mirror VNet exposes unexpected problematic side effects e g due to a closed loop effect see below the operator can easily revert back to the old production net work and continue to investigate the problem without affecting the production users any longer An inherent limitation of this approach is that closed loop effects caused by hosts outside the VNets cannot be predicted by monitoring the Mirror VNet For example an upgrade that provides faster delivery of requests to an external server may result in faster response traffic which may cause an overload on the network Such effect
173. s 16 GB RAM 4xSeagate SAS HDDs in a RAID 0 setup We simulate using Cbench 1 64 switches connecting to the controller under test and send back to back PACKET IN messages to measure the maximum flow rate the controller can handle Cbench reports the current flow rate once per second We let each experiment run for 50 seconds and remove the first and last 4 results for warmup and cool down Figure 6 9 presents the results We first compare the flow rates of the stand alone con trollers Nox pyswitch exhibits a median flow rate of 5 629 flows s over all switches noz switch reports 42 233 flows s and of simple 78 908 flows s Consequently we choose of simple as the client controller for the proxy controllers We next com pare flowvisor and ofrecord Flowvisor exhibits a median flow throughput of 35 595 flows s Ofrecord reports 42 380 flows s and ofrecord data reports 41 743 There is a slight variation in the performance of ofrecord introduced by the I O overhead The minimum observed flow rates are 28 737 and 22 248 We note that all con trollers exhibit worse maximum throughput when only connected to a single switch but show similar performance for 2 64 switches We conclude that Ofrecord while outperformed by of simple in control plane per formance is unlikely to create a bottleneck in a typical OpenFlow network which often includes a FlowVisor instance and guest domain controllers running more com plex policies on top of NOX
174. s Manually changing switch configurations runs a risk of operator error and introducing a tap induces downtime and is considered even riskier 3 Additionally the monitoring nodes may 97 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks of simple reference controller emulating a learning switch nox pyswitch NOX controller running Python pyswitch module nox switch NOX controller running C language switch module flowvisor Flowvisor controller running a simple allow all policy for a single guest controller ofrecord Ofrecord with substrate mode recording ofrecord data Ofrecord with guest mode recording with one data port and sync beacons and barriers enabled Table 6 4 Evaluation Overview of controllers used have to be synced to microsecond level to keep the flows globally ordered requiring dedicated expensive hardware With OF Rewind one requires only a few commod ity PCs acting as DataStores and a single central configuration change to record a consistent traffic trace controller software vendor on a completely new set of devices and ports On receiving the device or software the network operator can conduct further benchmarking to compare performance of different solutions in a fair manner 6 4 Evaluation When deploying OF Rewind in a live production environment we need to pay at tention to its scalability overhead and load on the switches This section
175. s is true for real time environments where computation and or exchanges of mes sages have to complete within bounded time Specific virtualization architectures like Janus 127 take soft real time constraints into account during scheduling e g for Multimedia applications For most of our work we choose XEN 35 as the host virtualization solution because of its flexibility and performance and for being a mature option in widespread use while also freely available as open source 12 2 1 Virtual Networks Router switch virtualization Recently vendors of network equipment have started to offer routers and switches that can be virtualized 86 46 Both software and hard ware isolated options are offered These virtualization solutions aim at configuration and state isolation between multiple tenants sharing a physical router Originally they did not typically provide the ability custom program the devices to run custom routing protocols or network stacks This has changed recently with the release of the JunOS SDK 81 Virtualization solutions in this space have to consider the particu lar timing and scheduling constraints for network protocols and provide appropriate precision Network link virtualization Virtual links form the complementary building block for virtual networks In local area networks Ethernet VLANs are used to build virtual links In port based form they provide resource sharing and partitioning a single
176. s only occur once the Mirror VNet is made productive and thus cannot be predicted by monitoring the Mirror VNet while it is still in mirror mode Note that closed loops within the VNets are not affected by this problem so one possible solution is to integrate all communicating parties including the end hosts into the VNet itself and have the VNet operate end to end Another concern is that the substrate must carry the additional load imposed by the Mirror and the Control VNets Note that depending on the problem under investi gation the mirroring strategies discussed in Section 5 1 2 can reduce the amount of traffic that actually has to be mirrored significantly and stress testing can be done gradually e g at 10 of the traffic load Finally assuming many co existent VNets on a well dimensioned e g 2 3 loaded substrate debugging a limited number even at Full Mirror mode is feasible If the impact of a proposed change cannot be deter mined by other means then the capacity overhead may reflect a fair price In the event of an unexpected traffic or load spike the production VNets are always granted priority over Mirror VNets Therefore debugging or testing is affected but the user service in the production VNet is not deteriorated 5 2 Prototype Implementation This work assumes the presence of a virtualization solution that enables duplica tion of a virtual machine In addition we require the network substrate to be able to dynam
177. s while Google and Blizzard and Skype are Service Providers Despite this dual actor landscape 63 161 there are already three main busi ness roles at play in the current Internet infrastructure provider which owns and manages an underlaying physical infrastructure called substrate connectiv ity provider which provides bit pipes and end to end connectivity to end users and service provider which offers application data and content services to end users However the distinction between these roles has often been hidden inside a single company For example the division inside an ISP that is responsible for day to day operation of the network is rarely the one that is planing and specifying the evolution of the network By identifying these players we can on the one hand identify different business op portunities and on the other hand disentangle the technical issues from the business decisions When considering the kind of network virtualization that enables the concurrent exis tence of several potentially service tailored networks a new level of indirection and abstraction is introduced which leads to the re definition of existing and addition of new business roles Physical Infrastructure Provider PIP which owns and manages the physical in frastructure the substrate and provides wholesale of raw bit and processing services i e slices which support network virtualization Virtual Network Provide
178. s chapter makes the following contributions i we introduce Mirror VNets ii discuss their intrinsic benefits and limitations iii present an implementation based on XEN and OpenFlow iv a practical case study in a multimedia QoS context v and evaluate the mirroring performance of the Linux kernel 60 5 1 Mirror VNets 5 1 Mirror VNets In this section we show how network virtualization enables Mirror VNets Then we discuss Mirror VNet use cases and discuss their intrinsic benefits and limitations 5 1 1 Assumptions Our approach is based on the assumption that the network is virtualized This in cludes node as well as link virtualization with proper isolation and resource manage ment and accountability As mentioned many virtualized resources are present even in today s network infrastructures e g VLANs MPLS VPNs and comprehensive management frameworks are currently emerging Virtualization is also considered a key enabler for the Future Internet 64 In addition we assume that the infrastruc ture is shared among a reasonable number of VNets and thus none of the VNets uses more than a fraction say 10 of the overall substrate resources Another assumption is that we can duplicate input traffic to multiple VNets Such capability is also commonly deployed in today s network infrastructure e g spanning ports on Ethernet switches multicast in routers optical splitters lawful intercept and the functi
179. s reveals the root cause of the problem NOX deems the des tination MAC address 00 26 55 da 3a 40 to be invalid This is because the MAC address contains the byte 0x3a which happens to be the binary equivalent of the character in ASCII This fake ASCII character causes the MAC address parser to interpret the MAC address as ASCII leading to a parsing error and the dropped packet Here Ofreplay provides the necessary debugging context to faithfully repro duce a bug encountered in a different deployment and leads us to the erroneous line of code 6 3 7 Faulty Routing Advertisements In a departure from OpenFlow network troubleshooting we examine how OFRe wind can be used to troubleshoot more general event driven network problems We consider the common problem of a network suffering from a mis configured or faulty router In this case we demonstrate how OF Rewind can be advantageously used to identify the faulty component We apply OF Rewind to troubleshoot a documented bug Quagga Bugzilla 235 detected in a version of the RIPv1 implementation of the Quagga 119 software rout ing daemon In the network topology given by Figure 6 8 a network operator notices that shortly after upgrading Quagga on software router B router C subsequently loses connectivity to Network 1 As routing control plane messages are a good ex ample of low volume guest control plane traffic they can be recorded by Ofrecord always on or alternatively
180. s such as WWW and email are unable to take advantage of the proposed system Lad et al 91 propose a high level architecture for sharing connectivity in a coalition peering without discussing its realization or presenting a performance evaluation Complementary to the above approaches the work reported in this chapter offers an evaluation of multihoming in wireless environments There are a plethora of papers that have reported on the difficulties posed by wireless environments and their impact on urban networks e g or 41 They indicate that careful planning of the wireless domains and avoidance of congested channels are necessary to achieve good wireless interconnection results 3 6 Summary In a residential or small business context a commodity broadband Internet access line is the first hurdle encountered by the end user This concerns reliability as well as performance Reliability and customer services of such commodity offerings have been reported to be problematic 102 The performance of such lines though adequate for mean utilization can negatively impact the user experience during peak demand Especially social media interaction or cloud backup services increasingly put demands upstream capacity Upstream bandwidth in such offerings is an order of magnitude lower than the downstream bandwidth Flow based routing can enable the combination of multiple commodity lines for im proved reliability and performance It also enab
181. ser 3 s connection via multihoming We now describe the earlier prototype flow routing system then propose a refined implementation based on OpenF low 104 3 1 1 Earlier Prototype FlowRoute In earlier work we developed a prototype named FlowRoute 157 that enables flow routing on the client machines It consists of three main components a preloaded shared library called libConnect which intercepts all client access to the Berkeley socket layer and delegates routing decisions Routed the unique central decision making module has a global view of the link loads and makes the actual routing decisions based on the flow routing strategies previously described The third com ponent on the client machines called Proxy is responsible for re directing the flows between a client and its destination and for informing Routed about the load of all shared DSL connections 28 3 1 Flow Routing Approach WRT w gt OpenFlow User 1 WLAN Client Flow WRT w AAA OpenFlow aie ra WDS D P Status Broadcast Controller E Controller of ctrl1 of ctrl2 User 1 E User 2 Figure 3 2 Components of a Flow Routing system with OpenFlow 3 1 2 OpenFlow Based Flow Routing Refining our approach proposed in prior work 157 we use OpenFlow for imple menting flow routing Figure 3 2 shows how Flow Routing is performed between two users User 1 shown in the left half on the Figure and User 2 right half Both us
182. service specific requirements which might in clude a VNet topology In addition it may specify the kind of interface it needs for service deployment and maintenance e g what level of console access It then delegates the instantiation to the VNO of its choice Once the VNet is instantiated the SP deploys its service using the interface provided by the VNO 52 4 2 VNet Control Architecture Service Requirement Spec ee Mgt Node Substrate Node Mgt Node Substrate Node 1 VNet Embedding 1 VNode Control a VNode Control Figure 4 3 Overview of VNet provisioning and Out of VNet access VNet Operator The VNO uses the specification it receives from the SP and gener ates a VNet specification It then negotiates with various VNPs on the basis of the VNet specification Once a VNP is selected the VNO waits for the VNP to assemble the VNet When it has access to the VNet which consists of a data and a control network it can use the control network also referred to as Out Of VNet access see Section 4 2 3 to instantiate the network service Finally it may instantiate the control interface needed by the SP VNet Provider Upon reception of the VNet resource description the VNP identifies candidate PIPs and splits the VNet resource description into multiple subsets It then negotiates with the candidate PIPs regarding the necessary substrate resources Once the PIPs have a
183. setup connected by a single switch of Vendor B Table 6 5 summarizes the results Flow rates up to 200 Flows s are handled without drops Due to the flow sync markers no packet reorderings occur and all flows are replayed in the correct order The exact inter flow timings vary though upwards from 50 Flows s To investigate the timing accuracy further we analyze the relative deviation from the expected inter flow delay Figure 6 11 presents the deviations experienced by the flows during the different phases of the experiment Note that while there are certainly 101 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Rate Flows s Drop sd timing in ms 5 0 4 5 10 0 15 6 20 0 21 1 50 0 23 4 100 0 10 9 200 0 13 9 400 19 15 8 800 41 21 5 Table 6 5 End to end performance measurement with uniformly spaced flows consisting of 1 UDP packet 1 00 5 00 20 00 rel deviation from exp inter flow delay 0 05 0 20 i 4 Rate Flows s Figure 6 11 End to end flow timing accuracy boxplot of the relative deviation from ex pected inter flow delay outliers for which the timing is far off the median inter flow delay remains close to the optimum for up to 100 Flows s Higher rates show room for improvement 6 4 5 Scaling Further We now discuss from a theoretical standpoint the limits of scalability intrinsic to the design of OFRewind when scaling beyond currently ava
184. since at this point we have no more visibility into the switch software implementation OF Rewind thus has proved useful in localizing the cause for the anomalous behavior of a black box component that would otherwise have been difficult to debug Even though the bug in this case is related to a prototype OpenFlow device the scenario as such misbehaving black box component and approach debugging by replay and bisection of control channel traffic are arguably applicable to non OpenF low cases as well 91 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks Replayed traffic characteristics 00 CPU usage a o CPU usage 0 i i i 0 i i i k a z y F E 20 00 21 00 22 00 23 00 00 00 08 06 08 36 09 06 ie 09 36 10 06 10 36 Time _ 2000 E E z 1500 o 5 1000 g 507 E 500 Ma M E E Ka 1 1 1 L 1 28 00 21 00 22 00 23 00 00 00 08 06 08 36 09 06 09 36 10 06 10 36 Time Time a Switch performance with original traffic b Switch performance with replayed traffic 4125 CPU Util a a STATS REQUEST 28 00 21 00 22 00 23 00 Nov 06 2009 to Nov 07 2009 c STATS REQUEST vs CPU Figure 6 5 Sawtooth CPU pattern case study pattern reproduced during replay of port and table STATS REQUEST messages Figure c shows no observable temporal correlation to message arrivals 6 3 3 Broadcast Storms Many Ethernet
185. ss the background of our work in particular recent innova tions in Networking that act as technological enablers for our work Virtual Networks and Software Defined Networks We then present the testbeds that we use to evaluate our systems 2 1 Virtual Networks Virtual networks have recently been proposed as enablers for overcoming the In ternet impasse 28 Anderson et al argue that easy access to virtualized testbeds can foster a renaissance in applied architectural research that extends beyond the currently incrementally deployable designs For instance clean slate approaches that focus on full accountability or anonymity can be deployed inside of a virtual network while leaving the current Internet untouched Arguably such testbeds can also pro vide an interesting platform for improving our control and troubleshooting abilities in networks Note that virtualization in computer systems in general is a rather old technique It has been successfully applied to e g CPU memory storage and almost all other system resources Recently it has become possible to virtualize entire systems hosts and routers even on commodity platforms and with limited overhead This enables running several isolated sets of programs or operating systems on a shared hardware Also network links have been virtualized using techniques such as VLANs and MPLS These two techniques can now be combined to form entire Virtual Networks where Chapter 2 Back
186. ssembled the pieces of the VNet it is completed and connected by the VNP Finally the VNP provides a management console access for the whole VNet by relaying the management interfaces of the PIPs Note that a VNP may aggregate requests for multiple VNets It may also request additional resources from the PIPs to satisfy future requests In this sense a VNP can act as any reseller would 53 Chapter 4 A Control Architecture for Network Virtualization Physical Infrastructure Provider The PIP identifies the appropriate substrate re sources based on the VNet topology descriptions it receives and allocates them It has the ability to migrate other VNets in order to free resources for new requests After setting up the VNet on its substrate it returns both the data and the control part of the VNet The control part includes the PIP level management consoles to allow the configuration of the virtual nodes Since VNets may span across multiple PIPs some virtual links may have to be setup across PIPs 4 2 3 Out of VNet Access Each VNet consists of two logical networks a data network and a control network The data network is what one commonly refers to in the context of virtual networks But per default any VNet after instantiation is just an empty set of resources that have to be configured Moreover a control interface is necessary during VNet oper ation for specific VNet management tasks Such a management access architecture is shown
187. state and distributed configuration This means that typically no coherent view of the system network state is available Vantage points only provide a local view of the state This can cause races and timer effects and hampers observation of problems In this context the term Heisenbug has been coined in ironic reference to the Heisenberg Uncertainty Principle for problems that vanish or change when one tries to observe them Speed scale geographical spread Due to the growing bandwidth demand net works are often operated at the boundary of what is technologically feasible Current enterprise links are moving to 10GB s and providers are deploying 30 GB s links This means that there is little headroom for adding additional functionality e g for instrumentation or troubleshooting As previously discussed networks operate at vastly different scales from small residential networks to giant datacenter and operator networks This makes it difficult to find abstractions that fit all of these environments Also the geographical spread of networks challenges our troubleshoot ing abilities physical principles already limit the coherence achievable in a global provider network Internet architecture challenges Other challenges for troubleshooting networks are created by the ubiquitous Internet architecture and its basic assumptions such as the end to end principle and the KISS principle of keeping the network simple and stupid En
188. stributed cloud based infrastructures The availability and performance of such cloud services highly depends on our ability to precisely control instrument and troubleshoot the networks that are involved For instance it is very convenient to move a spreadsheet from your local computer to a cloud based service like Google Docs 75 However a user s ability to access this documents then depends on the availability and performance of a large number of networks Specifically packets and flows may have to traverse e The user s residential home network Often such small networks contain noth ing more than a notebook and a commodity gateway router so the average utilization is very low but utilization at peak times may be high Costs are very important e Alternatively an enterprise network exposes different trade offs for availability cost and security e The access line to and access network of the user s Internet provider often not redundant and a single point of failure e The inter provider Internet with provider peerings complex routing and the core networks of all involved transfer providers e The datacenter network in the service provider s computing center Keeping control of all these different environments and networks is no small task nor is troubleshooting them when things go wrong The wide range of scales and scenarios makes one size fits all solutions difficult 1 1 Our Approach 1 1 Our Approach D
189. structure providers The idea is refined by Cabernet which introduces a Connectivity Layer abstracting the negotiations with different infrastructure providers and allowing for aggregation of several VNets into one set of infrastructure level resource reservations While this structure relates to our proposal our approach differs as we propose to split the service provider and connectivity provider role into the three roles of VNP VNO and SP These roles allow for a more granular splitting of responsibilities with respect to network provisioning network operation and service specific operations which may be mapped to different business entities according to various different business models Furthermore we extend the framework by considering privacy issues in federate virtual network operations and business aspects 57 Chapter 4 A Control Architecture for Network Virtualization 4 5 Summary In this chapter we propose a VNET Control Architecture that comprises four main entities reflecting different business roles Physical Infrastructure Providers PIPs Virtual Network Providers VNPs Virtual Network Operators VNOs and Service Providers SPs An important aspect of this control architecture is that it defines the relationships that govern the interaction between the players without prescribing their internal or ganization structure and policies In other words every entity manages its resources as it sees fit This
190. support live migration of virtual machines between physical hosts 2 1 2 System and Link Virtualization Individual resources have been virtualized in computer systems for a long time More recently it has even become possible to virtualize full host systems on commodity hardware a feature only offered by mainframe computers until then Also router vendors have started to offer virtualization support in their products We now discuss host sytem virtualization router virtualization and network link virtualization which form the fundamental building blocks for Virtual Networks 11 Chapter 2 Background Host virtualization A relatively recent innovation system virtualization has quickly become ubiquitous It allows for better exploitation of the computing capabilities of fered by contemporary commodity hardware increases availability and eases manage ment Options range from container based virtualization products that run a single OS kernel and offer lightweight but limited virtualization capabilities VServer 153 OpenVZ 9 BSD jails to full virtualization solutions that present a complete vir tual PC hardware to the guest and allow for unmodified operation of guest systems VMware 13 VirtualBox 152 KVM 90 Para virtualization solutions e g XEN 35 take a middle ground and allow several OS kernels to be executed in parallel under the supervision of a single hypervisor These solutions do not fully emulate the PC h
191. t on an upper bound for the possible performance improvements with multihoming It is roughly 40 They also show that a careful choice of providers is necessary We show that even greater improvements are possible during congested periods and for bulky flows Closely related to flow management MAR 129 provides a framework for leveraging the diversity of wireless access providers and channels to provide improved wireless data performance for the commuters via a wireless multihomed device that can be de ployed in moving vehicles Their packet scheduling architecture requires the presence of a proxy server as a concentrator and support from the ISP side The MultiNet project 43 proposes a multihomed single card device by means of virtualization In MultiNet the wireless card is continuously switched across multi ple networks In contrast to physically accessing multiple networks our work brings forward the idea of routing flows across the network in order to achieve better per formance The Stream Control Transmission Protocol SCTP is a layer 4 protocol that supports multihoming intrinsically It has been proposed by Stewart 142 and documented by RFC 4960 141 SCTP was primarily designed for Public Switched Telephone Network PSTN signaling messages over IP and still has to see wide deployment into popular TCP IP protocol stack implementations The address management takes place during the setup of the association and cannot be changed
192. tches and ports or to select controllers in a sandbox or production environ ment We further note that OF Rewind has potential in switch or controller benchmark ing By creating a sandbox for experimentation that can be exported to a standard replay format a network operator can concretely specify the desired behavior to switch or controller design engineers The sandbox can then be run within the premises of the switch or controller software vendor on a completely new set of devices and ports On receiving the device or software the network operator can conduct further benchmarking to compare performance of different solutions in a fair manner Comparison with traditional recording Based on the case presented in the last section we compare the effort of recording and instrumenting the network with and without OFRewind Note that while the specific traffic responsible for the fail ure is small RIP control plane messages the total traffic volume on the involved links may be substantial To attain a synchronized recording of this setup without OF Rewind and in the absence of host based instrumentation one has to 1 de ploy monitoring servers that can handle the entire traffic on each link of interest e g 105 and redeploy as link interests change Then one must either 2a recon figure both switches to enable span ports often limited to 2 on mid range hardware or 2b introduce a tap into the physical wiring of the network
193. ters They use a virtualized environment to run differing implementations and versions of routing software They use a specialized proxy to distribute incoming routing message to all these routing daemons Outgoing messages are decided up the routing proxy by applying a weighted voting scheme 5 6 Summary and Future Work In this chapter we present an approach that adds network troubleshooting capabil ities to virtualized enterprise or ISP networks Mirror VNets enable operators to upgrade configurations and software in an operationally safe manner with transac tion semantics while exposing the new system and configuration to real user behavior Less expensive specific problems can be investigated and debugged and interactions can be studied by sending only selected traffic to the Mirror VNet e g control plane 72 5 6 Summary and Future Work messages The experiences with our prototype implementation underline the feasi bility of the approaches especially if used on a virtualization platform that offers good isolation In the future we plan to further evaluate the scalability of the sys tem in the large scale OpenFlow enabled testbeds currently planned e g the Ofelia testbed 4 The capabilities of Mirror VNets for safe evolution and updates as well as troubleshooting are of particular interest in such environments where real users are using experimental software 73 OFRewind Enabling Record and Replay Troubleshooting for
194. the experimental networks and testbed platforms we use for parts of early practical evaluation 2 3 1 FG INET Routerlab BERLIN The Routerlab is the experimental network platform of the research group INET in Berlin It contains commodity switches routers load generating servers and network path emulators e g for emulating DSL access line characteristics from multiple vendors To reflect the Internet s structure on a miniature scale its devices are organized into several hierarchical and semi isomorphic clouds that are connected using a variety of different electrical and optical connections depicted in Figure 2 3 This allows an experiment to comprise emulated end user access lines edge level routers AS es and a high speed forwarding core using real hardware 22 2 3 Testbeds The testbed includes 43 commodity rack servers with 2 8 cores routers from Cisco and Juniper and switches from Cisco HP NEC Quantas Special purpose NetF PGA cards are available at a subset of servers The Routerlab features a hybrid customizable physical topology One part of the testbed is organized in a router centric fashion for teaching experimentation with commercial routers and current routing protocols depicted in the left third of Figure 2 3 The other part is switch centric with devices fully meshed onto a manageable switch fabric with 200 ports This part is mainly used for research experiments with novel network architectures
195. the introduction where a residential user accesses an online spreadsheet served by a cloud service and recall the chain of networks and connections that have to function 1 the user s residential home network and access line 2 the access network of the user s Internet provider 3 the inter provider peerings and the core networks of all involved transfer providers 4 the datacenter network in the service provider s DC 5 the actual service running on the server Due to the complexity a one size fits all solution for these different environments may be infeasible Consequently in this thesis we propose and evaluate several approaches for these individual areas and scenarios We now summarize our findings then give directions for future work in the area 7 1 Summary In this thesis we propose and evaluate the following approaches architectures and systems Community Flow Routing We propose and evaluate Flow Routing Chapter 3 as an approach to improve reliability and performance of customer Internet access lines Bandwidth utilization in residential networks is very uneven While the average utilization remains low the bandwidth may limit the quality of user ex perience in times of peak demand This especially concerns large uploads e g to social media sites as the upstream bandwidth offered by typical consumer Internet providers is an order of magnitude below the marketed downstream bandwidth The local access line is a
196. ting for Networks partitions and sub selects traffic to be replayed based on user defined criteria e g by message types performs a test run then continues the bisection based on whether a problem was reproducible Absence of determinism guarantees As opposed to host oriented replay debug ging systems which strive for determinism guarantees OF Rewind does not and cannot provide strict determinism guarantees as black boxes do not lend themselves to the necessary instrumentation Instead we leverage the insight that network de vice behavior is largely deterministic on control plane events messages ordering timing In some cases when devices deliberately behave non deterministically pro tocol specific approaches must be taken 6 1 3 OFRewind System Components As seen in Figure 6 1 a the main component of our system OF Rewind runs as a proxy on the substrate control channel i e between the switches and the original controller It can thus intercept and modify substrate control plane messages to control recording and replay It delegates recording and replay of guest traffic to DataStore components that are locally attached at regular switch ports The number of DataStores attached at each switch can be chosen freely subject to the availability of ports Both components can be broken down further into two modules each as depicted in Figure 6 1 b They consist of a recording and a replay module with a shared lo
197. tively be applied to parts of the traffic Note for instance that Control plane traffic has been shown to account for lt 1 of traffic volume but cause gt 95 of bugs 22 Accordingly many problems e g routing problems can be investigated by only mirroring control plane messages ver batim For the data plane traffic headers or even reconstructed summaries may well suffice Stress testing of a new software release can be started at only a fraction e g 5 of the overall traffic 62 5 1 Mirror VNets 5 1 3 Use cases Mirror VNets can be useful in many scenarios including routing optimizations and updates of network services Routing configuration optimization When a network operator decides that he wants to re optimize routing e g by changing the link weights of his interior routing protocol or by introducing routing policies he often does not want to experiment on the production network Among the drawbacks are unintentional path choices link overloads packet reordering and losses during convergence erroneous configurations etc However by using a Mirror VNet one can perform all changes while traffic in the production VNet continues to flow unaffected Indeed the operator can monitor the Mirror VNET for the expected benefits or unexpected side effects Only when the operator is happy with the new configuration state he switches roles and exposes the new routing to his users The capacity overhead is small as
198. ty provided by the underlying virtualization layers VNets must not be able to interfere with the safe operation of other VNets Note that there are different levels of isolation that can be required in a basic scenario the virtualization layer provides only functional isolation This inhibits VNets from directly interfering with the operation of other VNets There may still be perfor mance interactions and sidechannel attacks Full performance isolation in which the performance experienced each individual VNet is completely independent from the behavior of any other VNet is significantly harder to achieve and prevents certain optimizations e g overbooking Also depending on the use case different levels of programmability are required Custom routing configurations require a partitioned Forwarding Information Base FIB as well as the ability to run several independent routing processes at the same time This is the level of programmability offered by the first generation of virtualizable routers Custom routing algorithms require the ability to execute custom user processes with access to the Forwarding Information Base FIB This level of programmability is provided by 2nd generation programmable commercial routers e g via the Juniper JunOS SDK 81 If custom non IP protocols stacks are used VNet operators must be able to run a custom operating system image with a custom protocol instances on their virtual nodes Today this is t
199. u Figure 3 6 Analysis of the MWN trace CCDF of received bytes per application mean improvement increased to 2 47 median 1 83 This implies that there is a significant benefit for bulky flows We next switch from NistNet to using the actual 2 Mbps DSL lines with the wired interconnection network We observe that the results improve slightly in comparison to the emulated network For all flows the mean benefit is 1 20 median 0 95 Flows that last longer than 0 5 seconds experience an improvement of 2 49 median 2 03 The differences are explainable by small inaccuracies in NistNet Finally we use the well connected wireless network in 802 11a mode as our intercon nection network within the community Somewhat surprisingly the overall results improve slightly when compared to using a wired network The mean median im provements for longer flows are 2 61 2 11 and for all flows 1 27 1 0 This shows that the wireless network is not the bottleneck We reroute only 75 of the flows which imposes a load of less then 5 Mbps on the wireless network Overall we see that significant improvements are possible by taking advantage of multihoming Simulator Results We investigate the upper bound of the routing performance by using the simula tor on the traces gathered from the Web workload experiments This allows us to estimate the potential benefits and compare the performance prediction of the simu lator against the performance improve
200. ue to the wide range of environments and scenarios outlined above we do not strive for a single solution to all the challenges but address each scenario individually and discuss several designs architectures and systems for improving our ability to troubleshoot and enhance our ability to control operational networks In this journey we follow the rough chain of networks a flow may encounter on its way from the user to the cloud service We start out in the residential context With Flow Routing we propose an approach that improves the reliability and performance of residential community networks Chapter 3 We then turn to the inter provider core network scenario and propose an Architecture for Network Virtualization Chap ter 4 In the same context Mirror VNets Chapter 5 improve troubleshooting and enable safe upgrades of globally networked services Finally turning to a customized datacenter or enterprise network scenario we propose OFRewind Chapter 6 the first system to enable practical record and replay debugging in Operational Net works The term operational networks also implies a degree of practicability we want our approaches to work for real networks not just on paper This also means that we build prototype systems and evaluate them in practical environments It is our firm belief that in the sense of Dave Clark 131 running code is an existential founda tion for successful systems research In our work we strive for p
201. unities TridentCom 11 Location Shanghai China April 2011 WUNDSAM A MEHMOOD A FELDMANN A AND MAENNEL O Network Troubleshooting with Mirror VNets In Proceedings of IEEE Globecom 2010 Workshop of Network of the Future FutureNet III Location Miami FL USA December 2010 Earlier extended version WUNDSAM A MEHMOOD A FELDMANN A AND MAENNEL O Improving Network Troubleshooting using Virtualization Research Report Technische Universit t Berlin Fakult t Elektrotechnik und Informatik No 2009 12 June 2009 Levin D WUNDSAM A MEHMOOD A AND FELDMANN A BERLIN The Berlin Experimental Router Laboratory for Innovative Networking In Proceedings of the 6th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities TridentCom 10 poster session Location Berlin Germany May 2010 SCHAFFRATH G WERLE C PAPADIMITRIOU P FELDMANN A BLESS R GREENHALGH A WUNDSAM A KIND M MAENNEL O AND MATHY L Virtualization Architecture Proposal and Initial Prototype In VISA 2009 The First ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures August 2009 MANILICI V WUNDSAM A FELDMANN A AND VIDALES P Potential benefit of flow based routing in multihomed environments European Transactions on Telecommunications ETT 20 7 650 659 2009 Invited paper 1 Contents Introduction LI Our Approac
202. urge Experiment PDF of flow durations with and without Flow ROUtIN Gai hie ae dee ee a Ban 33 Analysis of the MWN trace CCDF of received bytes per application 35 Analysis of the MWN trace PDF of received bytes per application 36 MWN trace experiment Scatter plots of flow durations with and with out Flow Routing cuco 5 ot ks See ment nl 38 MWN trace experiment PDF of flow duration ratios with different WOLKIOAGS un er ee alee mn lee Gee tae ne A oh 39 MWN trace experiment CCDF of flow durations with vs without COMUNE e 2 ig ge Sead re Beh hte aks ae tes heen se Se eae doo Set 40 MWN trace experiment PDF of flow durations on different network mediasta gy A tases ces Tt hope ay Sir cas Cele oe Le ado a to ae igh aha eh DD teak Aeon 40 VNet management and business roles 2 22 2 22mm 48 VNet control interfaces between players 51 Overview of VNet provisioning and Out of VNet access 53 Mirror VNet example ae s so coce a aodai ea E e e 62 Mirror VNets Options for link attachment 65 Mirror VNet experiment setup o 66 Overview of MoS voice quality ratings 67 QoE case study Timeseries of VoIP packet drops and background traffic 68 QoE case study Mean MoS value per experiment phase 69 113 List of Figures 5 7 5 8 6 1 6 2 6 3 6 4 6 5 6 6 6 7 6 8 6 9 6 10 6 11 114 Mirroring performance experiment setup
203. ved Network Troubleshooting with Mirror VNets Node 1 Node 2 Node 3 Ext 1 VNode1a VNode2a VNode3a Ext 2 T VNode1b VNode2b 7 VNode3b gt gt dev null Control Control Control Figure 5 1 Mirror VNet example substrate running production VNet A consisting of VNodes la 2a 3a and Mirror VNet B consisting of VNodes 1b 2b 3b VNet A acts as a Mirror VNet and its output is discarded This is a relatively simple operation and can be completed quickly Finally the old VNet A can be dismantled and its substrate resources released Note that not all traffic has to be mirrored and not all mirrored traffic needs to be transmitted over the wire Depending on the scenario the operator can use mirror strategies to adapt the volume of the traffic to be mirrored and transmitted Possible Mirror strategies include a Full Mirror Every packet is mirrored verbatim and transmitted independently in both VNets b Packet Headers Only packet headers are transmitted in the Mirror VNet the payload is reconstructed with dummy data at the nodes c Traffic Stats Instead of actual packets only aggregated traffic statistics are transmitted and similar traffic is reconstructed at the nodes under investigation d Sampling Only a selected fraction of packets or flows is mirrored to the Mirror VNet These strategies can dynamically and selec
204. verted to the appropriate psycho acoustic scale R factor The R factor is then translated via a non linear mapping to the Mean opinion Score MoS a quality metric for voice MoS values range from 1 0 not recommended to 5 0 very satisfied Voice quality classes along with their respective R factor and MoS values are shown in Figure 5 4 67 Chapter 5 Safe Evolution and Improved Network Troubleshooting with Mirror VNets Phase 1 2 3 4 5 6 Active VNets A A A amp B A amp B A amp B B Production VNet A A A A B B QoS enabled B B B BG traffic load L L H H H H H Table 5 1 QoE case study experiment outline across phases T Ww Se iy ie Receiver 3 _ VNETA ge DA Xx VNETB 3 O BG Traffic 8 7 f 0 U packet drops 20 10 BG traffic throughput MBit s bas Nie i AY N ha Va Lost NE o 0 ae eh 1500 Experiment time s Figure 5 5 Timeseries of VoIP packet drops left and background traffic throughput right during the experiment as measured within VNets A B and at the end host receiver on right axis across time In addition Figure 5 5 shows the number of dropped pack ets across time again using 10s bins scale on left axis Drop rates for VNet A are depicted as blue plus signs VNet B as red crosses and the values measured at the receiver as green diamonds Table 5 1 summarizes the configuration of each phase 5
205. we can in many cases rapidly repeat experiments with different settings parameters code hooks while still reproducing the error We can for instance bisect the traffic and thus localize the sequence of messages leading to an error In summary OF Rewind is to the best of our knowledge the first tool which lever ages the properties of split architecture forwarding to enable practical and econom ically feasible recording and replay debugging of network domains It has proven useful in a variety of practical case studies and our evaluation shows OF Rewind does not significantly affect the scalability of OpenFlow controller domains and does not introduce undue overhead 6 1 OFRewind System Design In this section we discuss the expected operational environment of OFRewind its design goals and the components and their interaction We then focus on the need to synchronize specific system components during operation 77 Chapter 6 OFRewind Enabling Record and Replay Troubleshooting for Networks p OF Controller lt S DataStore a System components OFRewind S e A A DataStore b Software modules Figure 6 1 Overview of OFRewind Substrate Guest Superstrate OpenFlow OpenFlow Ctrl Plane Data Plane Am Ss To NN Toy L2 L2 Controller Ji Switch Ctrl Plane Data Plane 7 e g ARP i 3 7 vun B Ctri Plane Per E NESA a H d FS L4 L4 to L7 Ctri Plane j
206. within FlowSim and compare the results 31 Chapter 3 Augmenting Commodity Internet Access with Flow Routing We can use FlowSim to simulate network setups such as those shown in Figure 3 1 with various number of users different capacities and delays for uplink and down link directions and flow routing algorithm parameters The interconnection capacity between DSL subscribers is assumed not to be a bottleneck and thus modeled as infi nite As such the simulator does not distinguish if the community is interconnected via a wireless or wired network FlowSim consists of two main components a router and a scheduler The router iden tifies interactive and bandwidth limited flows Bandwidth limited flows are further classified by the direction referred to as dominant direction in which they exceed a threshold into downlink limited uplink limited and both limited flows Once a flow has been classified it is routed using one of the flow routing strategies The role of the scheduler is to distribute the available bandwidth among competing flows while approximating the dynamics of the TCP protocol In order to achieve reasonable performance it uses a fluid TCP model operating on discrete time slots rather than on a per event basis The simulation results do not show a significant difference when using smaller time slots than 1 10 second the current setting The distribution of the available up and downstream bandwidth is done in a fair
207. ypically possible on virtualized hosts but not network devices Economic tussles A virtualized infrastructure is sure to create new economic tus sles between the current stakeholders the Service Providers and the Physical In frastructure Operators over the responsibility for operating and managing VNets Thus we require the additional roles defined in our architecture Virtual Network Providers VNP and Virtual Network Operators VNO 4 4 Related Work Over the last years virtual network architectures have been an area of active research Some groups have focused on using network virtualization to enable larger scale and more flexible testbeds Other groups aim at virtualizing production networks or even the Internet We now revisit the proposals presented in Sections 2 1 3 and 2 1 4 and compare them to to our approach 56 4 4 Related Work Architectures for Experimental Networks There exist a large number of virtual ization architectures for testbeds and experimental networks 36 150 38 53 offering differing degrees of network virtualization Recall e g that PlanetLab 36 is a dis tributed large scale testbed with a hierarchical model of trust with Planet Lab Central PLC as its root authority VINI 150 supports simultaneous experiments with arbitrary network topologies on a shared physical infrastructure and provides rudimentary concepts for end user attachment 12 Emulab 53 offers virtual topol ogy confi
Download Pdf Manuals
Related Search
Related Contents
デジマチックインジケータ Digimatic Indicator Night Ranger Manual V2 取扱説明書 ー表示 Pdf Pizarra Panasonic UB-T880/W Copyright © All rights reserved.
Failed to retrieve file