Shadow Configurations : A Network Management Primitive
description
Transcript of Shadow Configurations : A Network Management Primitive
![Page 1: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/1.jpg)
Shadow Configurations:A Network Management Primitive
Richard Alimi, Ye Wang, Y. Richard Yang
Laboratory of Networked SystemsYale University
![Page 2: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/2.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 2
Configuration is Complex
Source: The Yankee Group, 2004
Source: Juniper Networks, 2008
“... human error isblamed for 50-80%of network outages.”
“80% of IT budgets isused to maintain the status quo.”
![Page 3: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/3.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 3
Configuration is Complex
Source: The Yankee Group, 2004
Source: Juniper Networks, 2008
“... human error isblamed for 50-80%of network outages.”
“80% of IT budgets isused to maintain the status quo.”
Why is configurationhard today?
![Page 4: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/4.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 4
Simulation & Analysis Depend on
simplified models Network structure Hardware and software
Limited scalability Hard to access
real traffic
Configuration Management Today
OSPF eBGP
VPNs
ACLs
TE
SLAsiBGPTraffic Software
Hardware
![Page 5: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/5.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 5
Configuration Management Today Simulation & Analysis
Depend onsimplified models Network structure Hardware and software
Limited scalability Hard to access
real traffic
Test networks Can be prohibitively expensive
OSPF eBGP
VPNs
ACLs
TE
SLAsiBGPTraffic Software
Hardware
![Page 6: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/6.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 6
Configuration Management Today Simulation & Analysis
Depend onsimplified models Network structure Hardware and software
Limited scalability Hard to access
real traffic
Test networks Can be prohibitively expensive
OSPF eBGP
VPNs
ACLs
TE
SLAsiBGPTraffic Software
Hardware
Why are thesenot enough?
![Page 7: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/7.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 7
Analogy with ProgrammingProgramming
Program TargetSystem
![Page 8: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/8.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 8
Analogy with ProgrammingProgramming
Network ManagementProgram TargetSystem
Configs TargetNetwork
![Page 9: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/9.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 9
Analogy with DatabasesDatabases
INSERT ...
DELETE ...UPDATE ...
INSERT ...
DELETE ...UPDATE ...
STATE A
STATE B
![Page 10: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/10.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 10
Analogy with DatabasesDatabases
Network Management
INSERT ...
DELETE ...UPDATE ...
INSERT ...
DELETE ...UPDATE ...
STATE A
STATE B
ip route ...
ip addr ...
STATE A
?
router bgp ...
STATE B
STATE C
router ospf ...STATE D
![Page 11: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/11.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 11
Enter, Shadow Configurations
Key ideas Allow additional (shadow)
config on each router In-network, interactive
shadow environment “Shadow” term from
computer graphicsOSPF eBGP
VPNs
ACLs
TE
SLAsiBGPTraffic Software
Hardware
![Page 12: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/12.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 12
Enter, Shadow Configurations
OSPF eBGP
VPNs
ACLs
TE
SLAsiBGPTraffic Software
Hardware
Key Benefits Realistic (no model) Scalable
Access to real traffic Transactional
Key ideas Allow additional (shadow)
config on each router In-network, interactive
shadow environment “Shadow” term from
computer graphics
![Page 13: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/13.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 13
Roadmap
Motivation and Overview
System Basics and Usage
System Components Design and Architecture Performance Testing Transaction Support
Implementation and Evaluation
![Page 14: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/14.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 14
What's in the shadow configuration? Routing parameters ACLs Interface parameters VPNs QoS parameters
Shadow configReal
config
System Basics
![Page 15: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/15.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 15
What's in the shadow configuration? Routing parameters ACLs Interface parameters VPNs QoS parameters
Shadow configReal
config
Shadow headermarked “1”
Real headermarked “0”
System Basics
![Page 16: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/16.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 16
Example Usage Scenario:Backup Path Verification
Primary
Backup
![Page 17: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/17.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 17
Example Usage Scenario:Backup Path Verification
Send test packets in shadow
![Page 18: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/18.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 18
Example Usage Scenario:Backup Path Verification
Disableshadow link
X X
![Page 19: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/19.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 19
Example Usage Scenario:Backup Path Verification
![Page 20: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/20.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 20
Example Usage Scenario:Configuration Evaluation Video Server
![Page 21: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/21.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 21
Example Usage Scenario:Configuration Evaluation Video Server
![Page 22: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/22.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 22
Example Usage Scenario:Configuration Evaluation Video Server
Duplicate packets to
shadow
![Page 23: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/23.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 23
Roadmap
Motivation and Overview
System Basics and Usage
System Components Design and Architecture Performance Testing Transaction Support
Implementation and Evaluation
![Page 24: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/24.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 24
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI
BGPOSPF
IS-IS
Interface0
Interface1
Interface2
Interface3
FIB
![Page 25: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/25.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 25
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI
BGPOSPF
IS-IS
Shadow-enabled FIB
Shadow Bandwidth Control
Interface0
Interface1
Interface2
Interface3
![Page 26: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/26.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 26
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI
Shadow ManagementBGP
OSPF
IS-ISBGP
OSPF
IS-IS
Shadow-enabled FIB
Shadow Bandwidth Control
Interface0
Interface1
Interface2
Interface3
![Page 27: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/27.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 27
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI
Shadow Management
CommitmentBGP
OSPF
IS-ISBGP
OSPF
IS-IS
Shadow-enabled FIB
Shadow Bandwidth Control
Interface0
Interface1
Interface2
Interface3
![Page 28: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/28.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 28
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI Shadow Traffic
Control FIB Analysis
Debugging Tools
Shadow Management
CommitmentBGP
OSPF
IS-ISBGP
OSPF
IS-IS
Shadow-enabled FIB
Shadow Bandwidth Control
Interface0
Interface1
Interface2
Interface3
![Page 29: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/29.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 29
Design and Architecture
Management
Control Plane
Forwarding Engine
Configuration UI Shadow Traffic
Control FIB Analysis
Debugging Tools
Shadow Management
CommitmentBGP
OSPF
IS-ISBGP
OSPF
IS-IS
Shadow-enabled FIB
Shadow Bandwidth Control
Interface0
Interface1
Interface2
Interface3
![Page 30: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/30.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 30
Shadow Bandwidth Control
Requirements Minimal impact on real traffic Accurate performance measurements of shadow
configuration
![Page 31: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/31.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 31
Shadow Bandwidth Control
Requirements Minimal impact on real traffic Accurate performance measurements of shadow
configuration
Supported Modes Priority Bandwidth Partitioning Packet Cancellation
![Page 32: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/32.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 32
Observation Content of payload may not important in many network
performance testing scenarios Only payload size may matter
Packet Cancellation
![Page 33: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/33.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 33
Observation Content of payload may not important in many network
performance testing scenarios Only payload size may matter
Idea: only need headers for shadow traffic
Piggyback shadowheaders on realpackets
Piggybackedshadowheader
Packet Cancellation
![Page 34: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/34.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 34
Packet Cancellation Details
Output interface maintains real and shadow queues
Packet cancellation scheduling
If real queue non-empty Grab real packet Piggyback shadow header(s)
if available
Else if shadow queue non-empty Send full shadow packet
![Page 35: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/35.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 35
Commitment
Objectives Smoothly swap real and shadow across network
Eliminate effects of transient states due to config changes Easy to swap back
![Page 36: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/36.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 36
Commitment
Objectives Smoothly swap real and shadow across network
Eliminate effects of transient states due to config changes Easy to swap back
Issue Packet marked with shadow bit
0 = Real, 1 = Shadow Shadow bit determines which FIB to use Routers swap FIBs asynchronously Inconsistent FIBs applied on the path
![Page 37: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/37.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 37
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases
![Page 38: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/38.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 38
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases Distribute tags for each config
C-old for current real config C-new for current shadow config
0
0
00
1 1
0: C-old1: C-new
10
10
10
0
![Page 39: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/39.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 39
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases Distribute tags for each config
C-old for current real config C-new for current shadow config
Routers mark packets with tags C-old
C-newC-old
C-old
C-newC-old
C-old
C-old
C-old
C-old
C-newC-new
C-new10
10
10
0
![Page 40: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/40.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 40
C-old
C-newC-old
C-old
C-newC-old
C-old
C-old
C-old
C-old
C-newC-new
C-new
0: C-new1: C-old
1 0
1 0
1 0
1
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases Distribute tags for each config
C-old for current real config C-new for current shadow config
Routers mark packets with tags Swap configs (tags still valid)
![Page 41: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/41.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 41
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases Distribute tags for each config
C-old for current real config C-new for current shadow config
Routers mark packets with tags Swap configs (tags still valid) Remove tags from packets
Resume use of shadow bit 0 0
1 0
1 0
1 0
1
![Page 42: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/42.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 42
Commitment Protocol
Idea: Use tags to achieve consistency Temporary identifiers
Basic algorithm has 4 phases Distribute tags for each config
C-old for current real config C-new for current shadow config
Routers mark packets with tags Swap configs (tags still valid) Remove tags from packets
Resume use of shadow bit For more details, see paper
0 0
1 0
1 0
1 0
1
![Page 43: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/43.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 43
Roadmap
Motivation and Overview
System Basics and Usage
System Components Design and Architecture Performance Testing Transaction Support
Implementation and Evaluation
![Page 44: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/44.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 44
Implementation
Kernel-level (based on Linux 2.6.22.9) TCP/IP stack support FIB management Commitment hooks Packet cancellation
Tools Transparent software router support (Quagga + XORP) Full commitment protocol Configuration UI (command-line based)
Evaluated on Emulab (3Ghz HT CPUs)
![Page 45: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/45.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 45
Static FIB 300B pkts No route caching
With FIB updates 300B pkts @ 100Mbps 1-100 updates/sec No route caching
Static FIB300B pktsNo route caching
![Page 46: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/46.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 46
FIB storage overhead for US Tier-1 ISP
Evaluation: Memory Overhead
![Page 47: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/47.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 47
Evaluation: Packet Cancellation
Accurate streaming throughput measurement Abilene topology Real transit traffic duplicated to shadow Video streaming traffic in shadow
![Page 48: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/48.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 48
Evaluation: Packet Cancellation
Limited interaction of real and shadow Intersecting real and shadow flows
CAIDA traces Vary flow utilizations
![Page 49: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/49.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 49
Evaluation: Packet Cancellation
Limited interaction of real and shadow Intersecting real and shadow flows
CAIDA traces Vary flow utilizations
![Page 50: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/50.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 50
Evaluation: Commitment
Applying OSPF link-weight changes Abilene topology with 3 external peers
Configs translated to Quagga syntax Abilene BGP dumps
![Page 51: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/51.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 51
Evaluation: Commitment
Applying OSPF link-weight changes Abilene topology with 3 external peers
Configs translated to Quagga syntax Abilene BGP dumps
Reconvergence in shadow
![Page 52: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/52.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 52
Conclusion and Future Work
Shadow configurations is new management primitive Realistic in-network evaluation Network-wide transactional support for configuration
Future work Evaluate on carrier-grade installations Automated proactive testing Automated reactive debugging
![Page 53: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/53.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 53
Thank you!
![Page 54: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/54.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 54
Backup Slides
![Page 55: Shadow Configurations : A Network Management Primitive](https://reader035.fdocuments.us/reader035/viewer/2022062302/56816814550346895ddda72b/html5/thumbnails/55.jpg)
August 19, 2008 Yale LANS / SIGCOMM 2008 55
Evaluation: Router Maintenance
Setup Abilene topology with 3 external peers
Configs translated to Quagga syntax Abilene BGP dumps