PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE



Similar documents
End-to-end Network Monitoring Infrastructure

to-end Packet Loss Estimation for Grid Traffic Monitoring

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

NETWORK MONITORING SESSION DESCRIPTION

SiteCelerate white paper

A Survey Study on Monitoring Service for Grid

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

APV9650. Application Delivery Controller

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Communication ports used by Citrix Technologies. July 2011 Version 1.5

OpenLDAP Oracle Enterprise Gateway Integration Guide

Setup Guide Access Manager Appliance 3.2 SP3

Network Monitoring Session Description

A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Setup Guide Access Manager 3.2 SP3

MULTI WAN TECHNICAL OVERVIEW

Oracle SOA Suite: The Evaluation from 10g to 11g

Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer

Securing Networks with PIX and ASA

Communication Ports Used by Citrix Technologies. April 2011 Version 1.5

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Application Note. Onsight TeamLink And Firewall Detect v6.3

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Interwise Connect. Working with Reverse Proxy Version 7.x

Architecture of a Network Monitoring Element

Using IPM to Measure Network Performance

EE4607 Session Initiation Protocol

Resource Utilization of Middleware Components in Embedded Systems

Introduction to Computer Security Benoit Donnet Academic Year

Key requirements for Interoperable IoT systems

Lecture 8a: WWW Proxy Servers and Cookies

Flow Analysis Versus Packet Analysis. What Should You Choose?

The Advantages of a Firewall Over an Interafer

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

Application Note. Onsight Connect Network Requirements v6.3

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

IP address format: Dotted decimal notation:

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Diagram 1: Islands of storage across a digital broadcast workflow

Media Gateway Controller RTP

HotSpot Enterprise Mobile Printing Solution. Security Whitepaper

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

FAQs for Oracle iplanet Proxy Server 4.0

Configuration Guide. BES12 Cloud

Oracle SOA Suite Then and Now:

IP Ports and Protocols used by H.323 Devices

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

INTRODUCTION TO FIREWALL SECURITY

Protocols. Packets. What's in an IP packet

A Tool for Evaluation and Optimization of Web Application Performance

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Data Grids. Lidan Wang April 5, 2007

Cisco Intercloud Fabric Security Features: Technical Overview

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

ETM System SIP Trunk Support Technical Discussion

Acano solution. Third Party Call Control Guide. March E

A Comparative Study of Signalling Protocols Used In VoIP

Content Distribution Networks (CDN)

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

Introduction to Service Oriented Architecture (SOA)

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Configuration Guide BES12. Version 12.2

Active Management Services

IERG 4080 Building Scalable Internet-based Services

Protocols and Architecture. Protocol Architecture.

Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh

RTP Performance Enhancing Proxy

CHAPTER THREE, Network Services Management Framework

Registrar Ramp Up Process. Prepared by Afilias

Traffic monitoring with sflow and ProCurve Manager Plus

TLS and SRTP for Skype Connect. Technical Datasheet

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Design of an Application Programming Interface for IP Network Monitoring

Internet Protocol: IP packet headers. vendredi 18 octobre 13

IP Phone Presence Setup

Multi Stage Filtering

Proxies. Chapter 4. Network & Security Gildas Avoine

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

NAT TCP SIP ALG Support

QAME Support for Policy-Based Management of Country-wide Networks

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

New Features in Neuron ESB 2.6

Transcription:

PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE Augusto Ciuffoletti, Yari Marchetti INFN-CNAF (Italy) Antonis Papadogiannakis, Michalis Polychronakis FORTH (Greece)

Summary Intro (3 slides) Architecture (11 slides) Prototype (5 slides)

Network Monitoring Accounting Fault detection and QoS enforcement User side monitoring How To? Dedicated tools Timed measurements Pre-scheduled sessions Presently mostly addressing admin usage

On demand network monitoring Hardwired monitoring exhibits serious issues: ignores user needs quadratic growth with system size (data, computation and traffic) On demand network monitoring: suits user needs (timing and modality) grows linearly with system load security management simplified observation rendered at once

Monitoring sessions A unique infrastructure regulates the activation of monitoring sessions Distinct agents implement distinct functionalities Client Network Monitoring Agent Sensor Hardwired monitoring On Demand Monitoring

Architecture layout Produces a network monitoring request Client Transport infrastructure Agent Passive monitoring effector Sensor Network monitoring takes place here

The Client Represents the entity that is interested in network monitoring results (e.g. a Workflow Manager) Submits a request to an agent specifying, traffic description (e.g. endpoints, ports), and the expected results Expectation includes traffic description (e.g. endpoints, ports), syntax (e.g. precision), semantics (e.g. tool name), metadata (e.g. max bandwidth) Requests are submitted to a well known local Agent

The Sensor The component which is in charge of effecting the observations: located on a possibly specialized host, uses passive monitoring techniques Receives monitoring request from the client, delivered by a well known local Agent, containing the specs of the traffic to monitor, and expected results Configures traffic filters and formats response packets Packets containing observations are delivered at once, embedded into a UDP stream

The Agent The basic component of the transport infrastructure Two basic functionalities: Routes requests from Clients to Sensors Maintains streams from Sensors to Clients Routes are computed using a global database representing the partitioning of the system into domains Clients and Sensors are aware of Agents located in the same domain

Security issues Traffic between Agents is authenticated using public keys certified by a CA, stored in the global database Authentication is needed to avoid spoofing, encryption seems unnecessary in most cases Traffic between Agents and Sensors or Clients is authenticated using public keys managed using criteria local to the Domain Response payload may be encrypted according to criteria negotiated between the Client and the Sensor

Domains A Domain is a set of Clients and Sensors that operate under control of one or more Agents A hierarchical arrangement of domains seems pointless Domains composition is recorded in a global database The global database can be implemented using LDAP or DNS (a hyperscalable gossip based solution is under study) Dom Σ Dom Ψ Dom Δ Dom Ω

Insight of a domain Agent Agent Client Client Sensor Sensor Sensor

Communication: Requests Agents offer a SOAP interface to accept Requests A Request is an XML document (a demo XSD has been produced) divided into two parts: an envelope which is modified en route by the Agents (per hop authentication, route record) a session description, which is delivered untouched to the Sensor (traffic description, expected results)

Communication: Data streams A stream is implemented as a sequence of UDP packets (a single session may generate several streams) Packet loss events entail detectable unavailability of some observations Route is determined using request route records, plus some immediate shortcut recipes Payload may be encrypted if network observations are considered sensitive information Multicast is in principle possible

The global database It implements the global state of the infrastructure: Sensors capabilities and managing agent Agents public key We envision a distributed implementation: each agent has access to a local proxy with part of the whole database requests out of the cache and updates are propagated implemented in LDAP (prototype)

Example Global DB Ok! Client Submits a request Agent B Agent A Sensor Performs Measuremens Data stream Lookup Request

The prototype: targets To assess the feasibility of the whole design (complex, with many components) To identify existing techniques to implement the various functionalities To layout exhaustively the design of the proposal To assess the integration between the work of the two partners NON TARGETS: demonstration of scalability, performance, user satisfaction.

The prototype: methodology Select well known, well supported technologies to concentrate on real issues Cleanly modularize the design to obtain a usable layout Make the prototype fully portable to support cooperation between partners OUR OPTIONS: Java for the language, SOAP and UDP for communication, LDAP for the database and virtualize the testbed (NETKIT)

The prototype: a sample Agent (requests): DB info retriever: transparent API to query the distributed database Request/Response Proxy: effects routing Local request Manager: interacts with Sensors Softstate: records requests and controls routing

The prototype: the testbed

Profiling protocol overhead Request submission (approx. 2300 octets): TCP (280 octets) SOAP (420 octets) envelope+signature (700 octets) session description (approx. 900 octets) Data stream packet (approx. 120 octets+payload) IP+UDP headers (28 octets) stream management (approx. 20 octets) signature (64 octets)

Conclusions The infrastructure we have designed and prototyped is a step towards a network monitoring infrastructure for a Grid environment in the Internet scale To achieve the target, we opted for an on demand approach, specially suited for a Grid environment There is no experience with on demand monitoring, although the technology is ready The implementation of the prototype was carried out as a Master thesis by Yari Marchetti, who later joined the research group, in three months