Cracking Network Monitoring in DCNs with SDN



Similar documents
Cracking Network Monitoring in DCNs with SDN

CREATE: CoRrelation Enhanced traffic matrix Estimation in Data Center Networks

On the effect of forwarding table size on SDN network utilization

Network Tomography and Internet Traffic Matrices

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

Restorable Logical Topology using Cross-Layer Optimization

Non-blocking Switching in the Cloud Computing Era

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

TRILL Large Layer 2 Network Solution

Advanced Computer Networks. Datacenter Network Fabric

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13

Blind SDN vs. Insightful SDN in a Mobile Backhaul Environment Extending SDN with Network State+

Brocade Solution for EMC VSPEX Server Virtualization

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

On Orchestrating Virtual Network Functions

Empowering Software Defined Network Controller with Packet-Level Information

Joint Host-Network Optimization for Energy-Efficient Data Center Networking

Enhancing BoD Services based on Virtual Network Topology Control

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Real-Time Traffic Engineering Management With Route Analytics

DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES

Load Balancing in Data Center Networks

Load Balancing in Data Center Networks

VIRTUALIZATION [1] has been touted as a revolutionary

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Dual-Centric Data Center Network Architectures

Longer is Better? Exploiting Path Diversity in Data Centre Networks

SummitStack in the Data Center

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network

Data Center Network Topologies: FatTree

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

Measurement-aware Monitor Placement and Routing

Latency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency

Probability-Model based Network Traffic Matrix Estimation

Ten Things to Look for in an SDN Controller

APPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

On the Placement of Management and Control Functionality in Software Defined Networks

Core and Pod Data Center Design

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support

Software Defined Network Application in Hospital

Backbone Capacity Planning Methodology and Process

Management and Orchestration of Virtualized Network Functions

Explicit Path Control in Commodity Data Centers: Design and Applications

Network traffic engineering

Decentralized Task-Aware Scheduling for Data Center Networks

The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM CALIENT Technologies

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

White Paper. The Top 20 Tools Needed for Hybrid IT

Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems?

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

software networking Jithesh TJ, Santhosh Karipur QuEST Global

Inter-domain Routing. Outline. Border Gateway Protocol

How To Improve Traffic Engineering

On real-time delay monitoring in software-defined networks

Load Balancing by MPLS in Differentiated Services Networks

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker

Resource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem

International Journal of Advanced Research in Computer Science and Software Engineering

Scaling 10Gb/s Clustering at Wire-Speed

Ethernet-based Software Defined Network (SDN)

Overlay Networks and Tunneling Reading: 4.5, 9.4

PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks

Network (Tree) Topology Inference Based on Prüfer Sequence

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

TOPOLOGIES NETWORK SECURITY SERVICES

T. S. Eugene Ng Rice University

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE

Datacenter Network Large Flow Detection and Scheduling from the Edge

Stability of QOS. Avinash Varadarajan, Subhransu Maji

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu

Optical interconnects in data centers

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014

Lustre Networking BY PETER J. BRAAM

DRIVEN by modern Internet applications and cloud computing,

DATA ANALYSIS II. Matrix Algorithms

Power-efficient Virtual Machine Placement and Migration in Data Centers

Advanced Computer Networks. Scheduling

Efficiently Monitoring Bandwidth and Latency in IP Networks

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Transcription:

Cracking Network Monitoring in DCNs with SDN Zhiming Hu Jun Luo Nanyang Technological University Singapore by Jean-Philippe Gauthier Paper presenta*on Fall 2015 Cheriton School of Computer Science Faculty of Mathematics

Network Monitoring A systema<c effort to understand the exchanges in the network Tradi<onally used to monitor the health/reliability of a network The results of network monitoring is vital for Operators Researchers Two important tasks Traffic Matrix es<ma<on Elephant Flow detec<on 2

Traffic Matrix (TM) Defines the volume of traffic for each corresponding pair of nodes R1 (R1, R2) = 15 R2 From/To R1 R2 R3 R4 R1 0 15 5 0 (R1, R3) = 5 (R2, R3) = 5 R2 0 0 5 0 R4 (R3, R4) = 10 R3 R3 0 0 0 10 R4 0 0 0 0 3

Of Mice and Elephants Around 2001, researchers started to use the term elephant flow Observa<ons were made that a small number of flows carry the majority of Internet traffic (elephant flows) and the remainder consists of a large number of flows that carry very lizle Internet traffic (mouse flow) An elephant flow is an extremely large con<nuous flow A mouse flow is everything else 4

How is this useful? Improve your network Traffic Engineering Increase link bandwidth Load Balancing Op<mize IGP metrics Change BGP exit points Failover strategies 5

Outline Prior Work Problems formula<on Proposed system Network Tomography in SDNs Evalua<on Conclusion 6

Prior work in SDNs Direct measurements Switch-based approaches Server-based approaches Direct measurements are extremely expensive Extra storage Extra processing Extra bandwidth 7

Prior work in ISPs (Network Tomography) Tomography refers to imaging by sec<ons or sec<oning, through the use of any kind of penetra<ng wave (radiology) Network Tomography is the inference of the internal behavior and topology of a network based on end-to-end network measurements and/or SNMP link counts Due to the rich connec<ons between switches in DCNs, end-to-end paths (variables) are far more than the number of links (available measurements) Makes the problem under-constrained Impossible to use state-of-the-art algorithms 8

The proposed solueon Network tomography alone can hardly offer accurate TM and elephant flow detec<on Direct measurements are too expensive Combine direct measurements AND network tomography Reach a balance between measurements overhead and accuracy Use SDN rules to provide more measurements when needed 9

Problems FormulaEon Let x(t) = { x1(t) xn(t) } denotes the volume of traffic between n paths at <me slot t Let traffic matrix X = { x(1) x(τ) } represents the traffic in DCN from slot 1 to τ Let y(t) = { y1(t) ym(t) } denotes the link counts over m links pulled from the link counters in the switch through SNMP at <me slot t Let link count matrix Y = { y(1) y(τ) } represents the link counts in DCN from slot 1 to τ Let rou<ng matrix A = { aij i = 1 m, j = 1 n } indicates whether a path traverses a link in the topology 10

Problems FormulaEon The rela<onship between X, Y and A is AX = Y However, the problem is heavily under-constrained Let aggrega<on matrix B indicates if the traffic through a certain path is measured by SDN rules Let SDN counters matrix Q denotes the counters defined with rules The rela<onship between X, Y, A, B, D and Q 11

Problems FormulaEon The rela<onship between X, Y, A, B, D and Q The goal is to maximize the rank of the measurement matrix D to increase iden<fiability and es<ma<on accuracy of X (TM) Problem 1: How to determine matrix B to maximize rank of D Problem 2: How to iden<fy elephant flows with all this informa<on 12

Proposed System 13

Network Tomography in SDNs Maximizing rank matrix comple<on is a complicated op<miza<on problem One proposed solu<on is to adapt the norm minimiza<on approach in compressive sensing Results in a non-linear program Transfer the problem into an integer linear program (ILP) by introducing new variables and constraints Solve with CPLEX Complexity of O((m+r) 2 n 2 ) 14

Network Tomography in SDNs Another proposed solu<on is to use the itera<ve rank maximiza<on algorithm An itera<ve method to construct the matrix D with a guarantee of maximum rank based on the fast rank computa<on algorithm Gradually picks up a row that sa<sfies the constraints, add it to D and test if rank is higher Complexity of O(mn(log min{m, n}) 2 ) each <me The solu<on found by the algorithms may be impossible (or highly expensive) to aggregate with current standard of SDN 15

Network Tomography in SDNs Topology aware heuris<c Let s assume a 4-ary fat-tree topology (k=4) 16

ProposiEon 1 "If we set up the SDN rules for the ToR pairs within every pod in fat-tree architecture first and then the ToR pairs across different pods both in an lexicographical order, then the SDN rules for the following ToR pairs would not increase the rank of the network tomography problem" 17

Case 1 "For the ToR pairs within each pod in lexicographical order, the last pair in each pod" Core Aggrega<on ToRs Pod 0 Pod 1 Pod 2 Pod 3 18

Case 2 "The pairs between all the ToRs (except the last ToR) and the last ToR" Core Aggrega<on ToRs Pod 0 Pod 1 Pod 2 Pod 3 19

Case 3 "The pairs between the last ToR in the penul<mate pod and the ToRs in the last pod (except the last ToR, which is included in the last case)" Core Aggrega<on ToRs Pod 0 Pod 1 Pod 2 Pod 3 20

Case 4 "The pair between the last ToR in the last third pod and the last ToR in the penul<mate pod" Core Aggrega<on ToRs Pod 0 Pod 1 Pod 2 Pod 3 21

All the cases The 12 rules (in a 4-ary fat-tree architecture) will not increase the rank of the network tomography problem Core Aggrega<on ToRs Pod 0 Pod 1 Pod 2 Pod 3 22

ProposiEon 2 In a fat-tree architecture, the total number of ToRs is k 2 /2 The number of all the possible ToRs pairs is k 2 /2 * (k 2 /2-1) * 1/2 Based on proposi<on 1, the number of ToR pairs that can t increase the rank of D is k 2 /2 + k Therefore, for a k-ary fat-tree topology, the number of SDN rules that can increase the rank is k 4 /8-3 * k 2 /4 - k 23

Elephant flow deteceon The proposed solu<on is to monitor only the flows with an high probability of being an elephant flow Since we know the total volume of traffic from tomography, we can propor<onally divide the total number of SDN rules based on the volume of traffic from one pair to another Then, assign SDN rules in a greedy manner Assign rules to server pairs with higher weight <ll there s no more rules les 24

EvaluaEon (Rank MaximizaEon) 25

EvaluaEon (TM EsEmaEon in Testbed) 26

EvaluaEon (Elephant flow deteceon in simulaeon) 27

Conclusion This paper proposes a monitoring system using Direct measurements with SDN rules Network tomography to es<mate the traffic matrix (TM) and detect elephant flows Systema<c and heuris<c algorithms have been used to maximize the iden<fiability of network tomography problems The evalua<on of the proposed approach shows promising results QUESTIONS? 28