Necessary Functions of a Multi-Stage Software Router
|
|
|
- Hillary Neal
- 5 years ago
- Views:
Transcription
1 SNMP Management in a Distributed Software Router Architecture Andrea Bianco, Robert Birke, Fikru Getachew Debele, Luca Giraudo Dip. di Elettronica, Politecnico di Torino, Italy, {last name}@tlc.polito.it Abstract Multi-stage software router architectures permit to overcome several limitations of single-stage software routers, allowing to expand the number of available interfaces and to increase the overall throughput. However, a multi-stage software router, despite being composed by several internal elements, must externally appear as a single device. A control protocol called DIST was defined to solve this problem from the control plane point of view for a previously proposed multi-stage architecture. In this paper, we tackle the same problem from the network management point of view. We define a management architecture and a manager-agent communication model to coordinate the information residing on the single elements of the multi-stage router to present a unified view to the external network management station issuing SNMP requests. We analyze the different variable types contained in the SNMP MIB-II and divide them into different categories depending on how the response to a SNMP request is compiled. The handling methods used to create the proper response to SNMP request for the different types of MIB variables are described. Analytical computations show that the proposed management architecture does not affect the multi-stage software router scalability. I. INTRODUCTION Networking equipments, and routers in particular, are characterized by the development of proprietary architectures. This situation yields to high cost in terms of both equipment and training, because network administrators need to manage different vendor devices or they are forced to a single vendor scenario. This situation drove network researchers to identify software routers (SRs) as an appealing alternative to proprietary devices. SRs are based on personal computers (PCs) running open-source network application software like Linux, Click modular router or XORP [1] [3]. The main benefits of SRs include: wide availability of multi-vendor hardware and documentation on their architecture and operation, low cost and continuous evolution driven by the PC market s economy of scale. Furthermore, open source SRs provide the opportunity to easily modify the router operation, resulting in flexible and configurable routers. Proprietary network devices often lack programmability and flexibility. Criticisms to single PC-based SRs are focused on limited performance, software instability, lack of system support, scalability issues, and lack of functionalities. Performance limitations can be compensated by the natural evolution of the performance of the PC architecture. Current PC-based routers and switches can sustain traffic load in the range 1-5 Gbit/s [4], [5], which is enough for a large number of applications. However, high-end performance and large size devices cannot be easily obtained on a single PC. To overcome these single PC-based router limitations, a multi-stage architecture (shown in Fig. 1) has been suggested in [6]. The multi-stage architecture exploits classical PCs as elementary switching elements to build large highperformance SRs. The proposed architecture has three stages: the layer 2 front-end load balancers (LBs), acting as interfaces to the external networks, the layer 3 back-end routers (BRs) providing the IP routing functionality and an interconnection network to connect the two stages. In the current implementation, the interconnection network is simply an Ethernet switch, the load balancers can be either hardware or software based, and the back-end routers are PCs running the Linux IP stack. The multi-stage architecture comprises a control entity, named virtual Control Processor (CP), that manages, controls and configures the whole architecture [7]. The virtual CP hides the internal details of the multi-stage architecture to external network devices and runs on a selected BR. The key advantages of such architecture among others include the ability to: scale the number of interfaces, recover from faults and provide functional distribution which single PCbased routers lacked. However, these advantages come at the cost of control and management complexity. This complexity problem has partially been addressed from the control plane perspective [7]. Indeed, an internal control protocol named DIST has been developed to: i) configure the architecture; ii) coordinate the routing process among BRs and the load balancing function among LBs; and iii) provide automatic fault recovery mechanisms. Furthermore, DIST dynamically maps the virtual CP on one of the BRs. Fig. 1. Multi-stage Software Router Architecture
2 In this paper we tackle the management plane issue (Sec. II) in the considered multi-stage architecture. A SNMP dual-role entity, named aggregator (Sec. III), is introduced to create the multi-stage architecture management base information (Sec. V- VI). Sec. IV describes the required communication model, whereas Sec. VII discusses the scalability of the approach. Finally, the paper is concluded in Sec. VIII. II. PROBLEM DESCRIPTION Networks require management procedures to be successfully operated. To reach this goal, network devices keep track of management information, such as cross-traffic, interface status and general system statistics. This information is organized into a management information base (MIB) [8] accessible through different management protocols such as SNMP, Net- Conf and NetFlow. We focus on SNMP, the most widely used protocol. SNMP is based on a manager-agent model consisting of an SNMP manager, an SNMP agent and a managed device deploying a MIB. The SNMP manager provides the human interface to the management system, while the SNMP agent interfaces the manager and the device MIB. Managers and agents use SNMP messages for information exchange. SNMP messages comprise request, response and trap messages. Requests can be either get or set a specific MIB variable. The agent, upon a request reception, sends back a response message with the result of the operation. Trap messages allow the agent to automatically notify the SNMP manager of important events. Whereas in a single device MIB variables are directly accessible, in a multi-stage architecture they are distributed among different internal elements. This requires additional complexity to collect and/or aggregate the information to compile the response for the manager. Indeed, the management of the multi-stage router requires the provisioning of a unified single-entity management information view to external devices. Therefore, it is necessary to address the problem of mapping and combining the distributed information into an aggregated view. This problem is twofold: i) definition of a communication model to collect the distributed data and ii) mapping the various data to create a single-entity view. An agent residing in the multi-stage software router must coordinate the internal elements and operate on the MIB information distributed among the internal elements to create such a single-entity view. III. MANAGEMENT ARCHITECTURE Fig. 2 depicts the proposed logical architecture. In this architecture, one SNMP dual-role entity, named aggregator, coordinates the internal independent SNMP agents, and interacts with the external managers issuing SNMP requests. Although the aggregator could run independently, it is integrated in the software modules running on the virtual CP. LBs redirect any external SNMP requests to this entity. When an SNMP request is received, the aggregator queries the internal SNMP agents to obtain the required MIB information and aggregates the information representing the multi-stage Fig. 2. Management System Used in Multi-Stage Software Router: logical architecture. architecture. Thus, the aggregator is a dual-role entity that acts as an agent for external managers and as a manager for internal agents. In our implementation, whereas the LBs and the switch (may) run an SNMP agent, BRs host both the aggregator and the agent functionalities. More precisely, each BR runs two instances of an SNMP process: an aggregator (listening on the standard SNMP port to be reachable from external managers) and a standard agent listening on a different, configurable, port, used for internal communication. Although all BRs are listening on the standard SNMP port, only one aggregator handles the external requests, because LBs explicitly forward SNMP request to the active aggregator which resides on the BR designated as the virtual CP by the DIST protocol. This scheme provides fast fault recovery for the multi-stage architecture in case the active aggregator fails. The take over procedure is taken care by the DIST protocol. When a failure is detected DIST elects a new Virtual-CP and reconfigures the LBs to properly redirect SNMP traffic. Observe that not all the internal elements may be SNMPcapable. Whereas BRs, being based on Linux PCs, can be assumed to be SNMP-capable, LBs, especially if hardware based, might not run an SNMP agent. Therefore, we assume two classes of LBs: SNMP-capable and SNMP-incapable. This assumption affects the way in which the aggregator collects and computes MIB variables, as detailed in Sec. VI. To ease information sharing among potential aggregators (which is needed for a quick takeover in case of failure) and communication with the DIST protocol entity, the architecture also comprises a database which stores configuration information of the internal elements and most MIB counters. If the LB is not SNMP-capable, a minimal set of interface statistics, namely the received/transmitted bytes/packets and the link speed information are also saved in the database. The management architecture was implemented and verified in a test-bed. The prototype is based on a customized version of Net-SNMP [9] and MySQL DBMS in addition to the software required to implement the multi-stage architecture. IV. MANAGER-AGENT COMMUNICATION MODEL The standard communication scenario used in SNMP [10] is defined for a single device which has all the information in the local MIB. However, since in the multi-stage architecture
3 the aggregator does not have the whole information locally available, a modification to the standard SNMP manager-agent communication model is required. Fig. 3 shows the modified manager-agent communication model. The dashed box includes the required extensions to deal with the multi-stage architecture. Upon request reception, the aggregator agent checks if the requested variable is locally available. If yes, it responds with the current available value. Otherwise, the aggregator manager sends SNMP requests to the appropriate internal element(s), collects the response(s) received within a given timeout (in our implementation set to one second) and, if required, aggregates the data. Finally, the aggregator agent answers to the original external SNMP request with this value. If multiple variables must be collected from the internal elements, a response to the external manager s request is sent on the basis of the available information at a given time, even if some responses from internal agents are not available yet. For those elements which did not respond for whatever reason, the aggregator uses, if available, the corresponding variable value saved in the database at the previous successful request. For counter type MIB variable, in the next request, if previously dead agent comes back to service, the aggregator checks the occurrence of any variable re-initialization: if found, the old value contained in the database and the newly available counter value are summed up to mask the discontinuity. This compensation guarantees that counters are kept monotonically increasing. Violating the monotonicity behavior of counters would be disturbing for the external management software, because these values are typically used to compute temporal trends. V. MULTI-STAGE ROUTER MIB In the MIB definition of our distributed architecture, we mainly consider, among all variables defined in the MIB-II tree, the system, the interface (IF) and the IP group objects for simplicity reason. These variables are grouped into two categories, based on how the aggregator computes the response: a) Global Variables: E.g. the routing table (iproutetable), the system up time (sysuptime) or the system name (sysname). Since they do not depend on a specific internal element, they are stored in the database to ease information sharing. A response to an external SNMP request for these variables translates into a simple query to the database, which might be populated by the aggregator itself or by the DIST daemon depending on the specific information. For example, the system name is provided by the aggregator, while the routing information is updated by DIST. b) Collected Variables: This category comprises all the variables requiring collection of data from one or more internal agents, e.g., interface information. A further division is between specific and aggregated variables. Specific variables can be fetched through a single request to a specific internal element. This group comprises all the variables containing specific properties of an internal element, e.g., the link status # $ $ Fig. 3. Modified incoming request scenario diagram for the multi-stage software router (ifoperstatus) or the link speed (ifspeed). Aggregate variables need instead multiple queries to different internal agents and require some kind of data aggregation. For instance, the total number of received packets at the IP layer (ipinreceives) or the discarded packets at the interface (ifindiscards) are computed using counters from several internal elements. VI. SINGLE-ENTITY MANAGEMENT INFORMATION VIEW Global and collected specific variables are easy to handle: a simple request forwarding either to the database manager or to an internal agent is needed. Thus, we focus on how to compute the more complex aggregated variables (e.g. IF and IP counters). Fig. 4 shows the main counters involved during packet forwarding, both in a single device router and in the multistage software router. The challenge is to define a mapping between the counters on the left, representing the single-entity view, and the counters on the right distributed over the three stages of the multi-stage architecture. Where ambiguity might exist, we use an over-line to indicate the mapped computed variables and the superscript LB and BR for counters at LB or BR interface respectively. Furthermore, for simplicity, we define ifinp kts as the sum of both unicast (ifinucastp kts) and non-unicast (if InN U castp kts) packets. 1) ifinoctets, ifinerrors and ifinunknownp rotos: These variables count respectively the number of received bytes, the number of discarded packets due to errors and unknown/unsupported protocols. These counters are interface specific and, therefore, simply treated as collected specific variables.
4 ' ## ) #'# #% #$ #% #$ '( '( *#( *#( Fig. 4. Main IF and IP counters involved in packet forwarding for a single-stage router (right) and the multi-stage software router (left). For simplicity, ifinp kts represents both ifinucastp kts and ifinnucastp kts. As introduced in Sec. III, the computation of MIB variables may be difficult because some internal elements may be non SNMP-capable. For this reason, we consider three different cases for LBs: SNMP-capable LBs: SNMP messages are used; SNMP-incapable, DIST-capable LBs: The existing control plane is extended to transport minimal traffic statistics (e.g. packet and byte counters); SNMP-incapable and DIST-incapable LBs: Data collecting is not possible. Counters are approximated using the information available at the BRs. Thus, some variables, e.g., if InErrors, are not available, because these events occur at LBs interfaces only. Similar considerations apply to the outgoing counterpart variables: if OutOctets, if OutErrors and if OutU nknownp rotos. 2) ifindiscards: As defined in the RFC 1213 [8], the variable if InDiscards counts the packets which, even if correct at reception time, are discarded by the device for any reason. We use this definition to compute all packets lost while traversing the internal network of the multi-stage architecture. However, it is not possible to track the exact path (and thereof the exact counters involved) of each packet within the multistage architecture, due to the unpredictable decision of the load balancing scheduler. Hence, we define D i as the share of packets internally discarded for interface i. D i is computed as the difference of the correctly received packets at the input interface of the LB (ifinp kts LB i ) and the sum of correctly received packets at all BRs interfaces R BR, weighted by w i, the percentage of traffic received at interface i. R BR and w i are computed as: R BR = w i = (ifinp kts BR j ) (1) ifinoctets LB i N k=1 ifinoctetslb k where M is the total number of BRs interfaces, and N the total number of external LBs interfaces. Thus, (2) D i = ifinp kts LB i w i R BR (3) ifindiscards i = ifindiscards LB i + D i (4) The above formulas make the implicit assumption that the loss probability is the same on all internal paths, but it has the nice property of being completely independent of the internal load balancing scheme adopted. Thanks to this property, the same procedure can also be applied on the reverse path to compute ifoutdiscard i without knowing the result of the routing operation. In case of SNMP-incapable and DIST-incapable LB, ifindiscards i is directly approximated by D i, replacing ifinoctets and ifinp kts in Eq. (1)-(4) with the received bytes rxbytes and received packets rxp kts statistics stored in the database by DIST. 3) ifinp kts: ifinp kts is the sum of all the corresponding counters at the BRs weighted by w i. ifinp kts LB i = w i ( ifinp kts BR j ) (5) For SNMP-incapable and DIST-incapable LB the same substitution as for if InDiscards apply.
5 4) IP counters: The IP counters are located only at the BRs. The mapping consists of the sum of all the corresponding IP counters at the BRs. For instance, ipinreceives is computed as: ipinreceives = ipinreceives BR j (6) 5) sysu pt ime: A special mention is needed for the sysupt ime variable, because this information is used as a time reference for the other variables by the external management software, to plot temporal graphs. sysu pt ime, is a global variable used to store the elapsed time since the management system was running. Given that the aggregator can run on different BRs at different time, it is important that the sysupt ime is not related to a specific instance of the aggregator, but rather tied to the up time of the whole architecture. To achieve this, the first aggregator stores the reference startup time into the database. When an aggregator fails and another takes over, the start up information remains the same. The sysupt ime is re-initialized only if all the BRs fail, i.e., when the multi-stage router fails. VII. SCALABILITY ANALYSIS The use of a centralized aggregator has the advantage of reduced management complexity. However, scalability issue might arise due to the concentration of SNMP traffic. Therefore, we try to estimate the amount of SNMP traffic internally generated to process an external SNMP request. The worst case scenario is a request for If InDiscards, because it implies the collection of the largest number of variables from the multi-stage architecture (see Eq. (1)-(4)). As reported in Sec. VI, M is the total number of BR interfaces, whereas N is the total number of external LB interfaces. Eq. (1) requires to collect 2M variables, because IfInP kts is the sum of two variables and Eq. (2) requires N variables. Furthermore, three more variables are needed for Eq. (3) and (4). In the worst case, for each variable two SNMP messages (request and response) are required. Typically, the management station repeats the requests periodically to plot temporal graphs and keep device history. Therefore, the amount of management traffic can be computed as: 2(2M + N + 3)S 2(2M + N)S total traffic = (7) T T where S is the SNMP message size, typically about 100 bytes for SNMP responses [11], and T is the update period, typically set to about 5 minutes. Let us now consider two scenarios: i) a medium range edge router with 360 interfaces at 1Gbps (i.e. a mid-range 7600 series Cisco router [12]) and ii) a core router with 16 interfaces at 10Gbps (i.e. a high-end Juniper T series router [13]). Assuming PCs with 1Gbps routing capability and one LB per interface (worst case in terms of generated messages), then for i) M = 360, N = 360 and for ii) M = 160, N = 16. Even assuming a very aggressive update period of 1s, the management traffic would be equal to 216 KBytes/s and 67 Kbytes/s respectively for one MIB variable. Even considering tens of MIB variables traced by the management station, the management traffic is negligible with respect to the total forwarding routing capacity, posing no threat to the overall architecture. Furthermore, the above formula overestimates the real internal management traffic, because an SNMP request is smaller than a SNMP response message and, more importantly, it does not consider the possibility of aggregating more variables into the same SNMP message, which would permit to further reduce the number of messages and increase transmission efficiency. VIII. CONCLUSIONS The multi-stage software router, being a distributed router architecture, requires a coordinated information management to mask the internal structure and to present the architecture to external SNMP managers as a single device. We defined a management system based on three elements (managers, aggregators and agents) as an extension of the standard SNMP model. The new system consists of a multistage distributed MIB and an extended communication model, which define the mechanisms to collect data from distributed elements in a reliable way and to aggregate the data in an unified view. The net-snmp [9] implementation has been modified and tested in a small scale test-bed and its scalability was assessed through simple load computations for two classical high-end router configuration. REFERENCES [1] Linux, [2] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, The Click Modular Router, ACM Trans. Comput. Syst., vol. 18, no. 3, pp , [3] M. Handley, O. Hodson, and E. Kohler, XORP: an Open Platform for Network Research, SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp , [4] M. Dobrescu, N. Egi, K. Argyraki, B. G. Chun, K. Fall, G. Iannaccone, A. Knies, M. Manesh, and S. Ratnasamy, RouteBricks: Exploiting Parallelism to Scale Software Routers, in In Proceedings of the 22nd ACM Symposium on Operating Systems Principles, [5] A. Bianco, R. Birke, D. Bolognesi, J. M. Finochietto, G. Galante, and M. Mellia, Click vs. Linux: Two Efficient Open-Source IP Network Stacks for Software Routers, in IEEE Workshop on High Performance Switching and Routing, 2005, pp [6] A. Bianco, J. M. Finochietto, M. Mellia, F. Neri, and G. Galante, Multi- Stage Switching Architectures for Software Routers, IEEE Network, Issue on Advances in Network Systems, vol. 33, no. 1, pp , [7] A. Bianco, R. Birke, J. Finochietto, L. Giraudo, F. Marenco, M. Mellia, A. Khan, and D. Manjunath, Control and Management Plane in a Multi- Stage Software Router Architecture, In Proc. HPSR, pp , [8] K. McCloghrie and M. Rose, RFC 1213 Management Information Base for Network Management of TCP/IP-based internets: MIB-II, 1991, [9] Net-SNMP, [10] D. Harrington, R. Presuhn, and B. Wijnen, RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks, 2002, [11] C. Pattinson, A Study of the Behaviour of the Simple Network Management Protocol, In Proc. of 12th International Workshop on Distributed Systems, Nancy, France, [12] Cisco 7600 Series Routers, routers/ps368/index.html. [13] T Series Core Routers, en.pdf.
Evaluation of Switching Performance of a Virtual Software Router
Evaluation of Switching Performance of a Virtual Roberto Rojas-Cessa, Khondaker M. Salehin, and Komlan Egoh Abstract s are an alternative low-cost and moderate-performance router solutions implemented
OpenFlow Switching: Data Plane Performance
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 21 proceedings OpenFlow : Data Plane Performance Andrea Bianco,
Challenges in high speed packet processing
Challenges in high speed packet processing Denis Salopek University of Zagreb, Faculty of Electrical Engineering and Computing, Croatia [email protected] Abstract With billions of packets traveling
An Overview of SNMP on the IMG
An Overview of SNMP on the IMG Description SNMP The SNMP provides a way to control and monitor a variety of equipment using one network management protocol. To do this, SNMP uses a number of common Management
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Scalable Layer-2/Layer-3 Multistage Switching Architectures for Software Routers
Scalable Layer-2/Layer-3 Multistage Switching Architectures for Software Routers Andrea Bianco, Jorge M. Finochietto, Giulio Galante, Marco Mellia, Davide Mazzucchi, Fabio Neri, Dipartimento di Elettronica,
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
Demo of Triple Play Services with QoS in a Broadband Access Residential Gateway
Demo of Triple Play Services with QoS in a Broadband Access Residential Gateway Francisco Valera, Jaime García, Carmen Guerrero, Vitor Manuel Ribeiro and Vitor Pinto Department of Telematic Engineering
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
Performance of Software Switching
Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance
Development of Monitoring Tools for Measuring Network Performances: A Passive Approach
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
The Three-level Approaches for Differentiated Service in Clustering Web Server
The Three-level Approaches for Differentiated Service in Clustering Web Server Myung-Sub Lee and Chang-Hyeon Park School of Computer Science and Electrical Engineering, Yeungnam University Kyungsan, Kyungbuk
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
sflow Why You Should Use It And Like It NANOG 39 February 04-07, 2007
sflow Why You Should Use It And Like It NANOG 39 February 04-07, 2007 Richard A. Steenbergen nlayer Communications, Inc. What is sflow? sflow is a standards based protocol for exporting
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Configuration of Cisco Routers. Mario Baldi
Configuration of Cisco Routers Basics Static Routing Mario Baldi Politecnico di Torino mario.baldi[at]polito.it http://staff.polito.it/mario.baldi ConfRoutEn - 1 M. Baldi: see page 2 Copyright Notice This
TRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
How To Build A Policy Aware Switching Layer For Data Center Data Center Servers
A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley 1 Problem: Middleboxes are hard to deploy Place on network path Overload path
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
IPv6 Network Management. [email protected]
IPv6 Network Management [email protected] Outline Introduction Managing IPv6 networks SNMP over IPv6 Management platforms Management tools IPv6 LAN IPv6 MAN/WAN Examples/Demos Introduction Manage a network:
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
QoSpy an approach for QoS monitoring in DiffServ Networks.
QoSpy an approach for QoS monitoring in DiffServ Networks. Ulrich Hofmann Alessandro Anzaloni Ricardo de Farias Santos. [email protected] Instituto Tecnológico de Aeronaútica São José dos Campos-SP-Brazil
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
A Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
Device Discover: A Component for Network Management System using Simple Network Management Protocol
Device Discover: A Component for Network Management System using Simple Network Management Protocol Garima Gupta, Daya Gupta Abstract Virtually all existing networked system management tools use a Manager/Agent
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Virtual Network Functions Orchestration in Enterprise WLANs
Virtual Network Functions Orchestration in Enterprise WLANs Roberto Riggio, Tinku Rasheed, Rajesh Narayanan CREATE-NET, Italy; Email: [email protected] Dell Inc., U.S.A.; Email: n [email protected]
THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS
THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS Alexandru BIKFALVI, Paul PĂTRAŞ, Cristian Mihai VANCEA, Virgil DOBROTĂ Technical University of Cluj-Napoca, Communications
Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
Simple Network Management Protocol
CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
Analyzing and Optimizing the Linux Networking Stack
Analyzing and Optimizing the Linux Networking Stack Raffaele Bolla*, Roberto Bruschi*, Andrea Ranieri*, Gioele Traverso * Department of Communications, Computer and Systems Science (DIST) University of
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар
УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук
Traffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 107 Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study Mehdi Jahanirad,
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Using SNMP for Remote Measurement and Automation
Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Implementation of a Department Local Area Network Management System
Implementation of a Department Local Area Network Management System I-Ping Hsieh Lai-Ming Shiue Shang-Juh Kao Department of Computer Science Department of Applied Mathematics Department of Computer Science
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Qualifying SDN/OpenFlow Enabled Networks
Qualifying SDN/OpenFlow Enabled Networks Dean Lee Senior Director, Product Management Ixia Santa Clara, CA USA April-May 2014 1 Agenda SDN/NFV a new paradigm shift and challenges Benchmarking SDN enabled
Network Expansion Devices, Switches & Routers
This chapter provides understandings on network devices such as switches and routers, used for expanding coverage of the network. FIRST EDITION 05-2012 Hub, Switch and Router Hub, Switch and Router Ethernet
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
Evaluating the Suitability of Server Network Cards for Software Routers
Evaluating the Suitability of Server Network Cards for Software Routers Maziar Manesh Katerina Argyraki Mihai Dobrescu Norbert Egi Kevin Fall Gianluca Iannaccone Eddie Kohler Sylvia Ratnasamy EPFL, UCLA,
COMPSCI 314: SDN: Software Defined Networking
COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
TSX ETY 110 Module 8
Module 8 Introduction Subject of this chapter What s in this Chapter? This chapter describes the implementation of a TSX ETY 110 module. This chapter contains the following sections: Section Topic Page
Study of Network Performance Monitoring Tools-SNMP
310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources
How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C
esafe Gateway/Mail v. 3.x Load Balancing for esafe Gateway 3.x with Cisco Web NS and CSS Switches Design and implementation guide esafe Gateway provides fast and transparent real-time inspection of Internet
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
A Model Design of Network Security for Private and Public Data Transmission
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
Multi-Stage Software Routers Implementation in Virtual Environment
POLITECNICO DI TORINO III Facoltà di INGEGNERIA Master of Science in Computer and Communication Networks Engineering Master Thesis Multi-Stage Software Routers Implementation in Virtual Environment Relatore:
