Flow Monitoring With Cisco Routers



Similar documents
Revisiting the Case for a Minimalist Approach for Network Flow Monitoring

Revisiting the Case for a Minimalist Approach for Network Flow Monitoring

SDN Programming Languages. Programming SDNs!

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot

Detecting Network Anomalies. Anant Shah

Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology

Firewall Examples. Using a firewall to control traffic in networks

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4

Internet Packets. Forwarding Datagrams

Network Virtualization Based on Flows

Network Security through Software Defined Networking: a Survey

Network Tomography and Internet Traffic Matrices

Wireshark Developer and User Conference

Application Note. Onsight Connect Network Requirements V6.1

Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Facility Usage Scenarios

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

OpenFlow with Intel Voravit Tanyingyong, Markus Hidell, Peter Sjödin

Load-Balancing Introduction (with examples...)

Efficiently Managing Firewall Conflicting Policies

Design and Implementation of Firewall Policy Advisor Tools

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

Limitations of Packet Measurement

Quality of Service Routing Network and Performance Evaluation*

Towards Load Balancing in SDN Networks During DDoS attacks

Network (Tree) Topology Inference Based on Prüfer Sequence

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Conflict Classification and Analysis of Distributed Firewall Policies

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Integrated Traffic Monitoring

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Network Security TCP/IP Refresher

Agenda. sflow intro. sflow architecture. sflow config example. Summary

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

EE627 Lecture 22. Multihoming Route Control Devices

Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches

Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks

6/8/2011. Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction

Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN Sanjay Khanna Foundry Networks

Router Architectures

Experimentation driven traffic monitoring and engineering research

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Distributed Denial of Service Attacks & Defenses

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

FIREWALL AND NAT Lecture 7a

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Internet Routing. Review of Networking Principles

IP Traffic Engineering over OMP technique

Load Balancing Using PCC & RouterOS

Security in Structured P2P Systems

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Steve Worrall Systems Engineer.

- EtherChannel - Port Aggregation

IP Security. Ola Flygt Växjö University, Sweden

RapidIO Network Management and Diagnostics

Configuring Advanced Server Load Balancing

What s New in VMware vsphere 5.5 Networking

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Load Balance Mechanism

Table of Contents. Cisco How Does Load Balancing Work?

On the effect of forwarding table size on SDN network utilization

Savera Tanwir. Internet Protocol

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

Vanguard Applications Ware IP and LAN Feature Protocols. Firewall

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Multiple Service Load-Balancing with OpenFlow

Firewalls P+S Linux Router & Firewall 2013

Load Balancing Using PCC & RouterOS

LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Link Aggregation and its Applications

Chapter 15. Firewalls, IDS and IPS

PART III. OPS-based wide area networks

Algorithms for Advanced Packet Classification with Ternary CAMs

Transcription:

CSAMP: A System for Network- Wide Flow Monitoring Vyas Sekar,Michael K. Reiter, Walter Willinger, Hui Zhang,Ramana Rao Kompella, David G. Andersen Presentation by Beletsioti Georgia

Flow measurements today There was a router-centric view of current measurements solutions in network, until now. Routers are completely independent of each other, so we have much more flow measurements that we need and inefficient use of router resources So we pass from a router-centric approach to a systemwide approach of monitoring network

What is Csamp? Csamp, a system for Network-Wide Flow Monitoring Csamp is made because current flow monitoring solutions are inadequate for many network management applications Csamp is a system for coordinated flow monitoring within an AS (Autonomous System) The goal of csamp is to assign sampling responsibilities to routers in a coordinated manner to optimize network-wide flow monitoring objectives. Coordinated Sampling

Motivation Design System Architecture Discussion & Future Work Evaluation Conclusions

Motivation In past many people tried to design such network-wide flow monitoring systems, but they were not such efficient such Csamp There are 5 criteria that a flow monitoring system should satisfy provide high flow coverage minimize redundant reports satisfy network-wide flow monitoring objectives work within router resource constraints be general enough to support a wide spectrum of flow monitoring applications

Design of Csamp 3 basic ideas Flow sampling instead of packet sampling Hash-based coordination Network-wide optimization

Random flow sampling preserves the fidelity of traffic estimation (single router) Each router has a table of hash ranges indexed using a key. By receiving a packet the router looks the hash range (key = hash of packet s header fields), computes the 5-tuple (srcip, dstip, srcport, dstport, protocol) of an IP flow, if the hash falls in the range of the cell, this hash is used as index to a flow table, if the flow already exists it updates the entry else it creates a new one.

Random flow sampling preserves the fidelity of traffic estimation (single router) On a single router, do random *flow* (not packet) sampling. Each packet header is hashed Hash range {1,6} {7,9} ok We have an entry in flow table Use as index If falls {10, 12}.. Flow table If flow already exists update else create new entry Computes 5-tuple

Hash-based coordination uses hash-based selection (using the same hash function but having different hash ranges) to eliminate duplicate measurements in the network. So different routers can monitor disjoint flows without requiring explicit communication between routers (multiple routers, single path)

Hash-based coordination multiple routers Hash range Flow table Hash range Flow table Hash range Flow table Hash of any flow will match at most one router s hash range!!

Network-wide optimization uses optimization framework to specify and satisfy network wide monitoring objectives while respecting router resource constraints. Note : Many paths = Origin - Destination (OD) pairs in network Single path network Multiple origin-destination pairs in the network. Per origindestination pair, assign non-overlapping ranges to each router.each router has a sampling manifest that specifies the hash range for each origin-destination pair that it might see. For each packet, see if it should be logged (based on hash and origin-destination), and log it. The routers then generate flow reports which can be sent back to existing applications

{1,5} {7,9} Hash range for each OD pair Get OD-pair from packet Green or Yellow????

Csamp algorithm for router Get OD-pair from packet (usually based on packet information, src & dst IP addresses) Compute hash (flow = packet 5-tuple) Look up hash-range for OD-pair from sampling manifest Log if hash falls in range for this OD-pair

To achieve flow monitoring goals specified in terms of OD- pairs, csamp optimization engine needs the traffic matrix and routing information. Traffic matrices obtained by using estimation techniques that may have errors, so appropriate techniques are used in order to minimize the error.

input Traffic matrix Routing information Optimization engine output Sampling manifests dissemination Make reports

System Architecture Mechanisms Obtaining Origin Destination pairs in network for packets the ingress routers mark each packet header with the OD-pair identifier (given by optimization engine). Responding to long-term (e.g. uses traffic during previous week) & short-term traffic dynamics avoiding underfitting and overfitting the optimization engine must be able to predict the traffic matrix to compute the sampling manifests

Manage memory resources on routers We store only flow counters in StaticRam(SRAM) instead of storing the whole flow record (the IP 5-tuple, the OD-pair identifier, and counters). Computing the optimal solution In order to respond in near-real time to network dynamics, use new more efficient algorithms. Handling routing changes Precompute sampling manifests for different scenarios in a given measurement cycle, so if there is a change an appropriate sampling manifest corresponding to this scenario is already available.

Evaluation Comparison between Csamp and other previous systems

Coverage

Redundant flow reporting

Flow coverage per OD-pair

Coverage VS optimal solution Estimated traffic with our engine Vs Actual traffic

Discussion & Future Work OD-pair identifiers Modifications to packet header Upgrades to border routers to compute the engress router for each packet Router memory exhaustion A router s flow memory might be exhausted due to traffic dynamics Find better choice of eviction of flow records Changes cause loss of flow coverage or duplicates Applications Confirm that csamp provides better fidelity to traditional traffic engineering applications

Conclusion Existing solutions focus on incrementally improving single-router sampling algorithms, instead of Csamp, a system that takes a network wide approach to flow monitoring.

So.. Much greater monitoring coverage Better use of router resources Satisfy better flow monitoring goals compared to existing solutions

Questions???