Annotation Layer

Download Report

Transcript Annotation Layer

An Annotation Layer for Network Management
George Porter, Randy H. Katz
Overview

FTP
R
R
IS
SMTP
Lack of visibility
ISP Ingress

Increased number and complexity of network services
 Unexpected Traffic Patterns
II
Web
NFS
DNS
DNS
Server tier
R
Problem:
 Users in the access tier complain of slow web access, can’t
mount files, and “DNS operation timed out messages”
 Network Management Approach:
 Is the problem isolated to one client? To one service?
 Tools to discover problem: e.g., correlation between SMTP
traffic from ISP ingress and excessive load on name service
 Experimental intervention to confirm relationship
 Ability to add new policy for redirection and request throttling
Legitimate: new apps, flash traffic
 Illegitimate: worms, viruses, misconfiguration (Mextreme)


IC
Client
But, need for more visibility and control

DNS
Dist Tier
High speed links, distributed services, can’t modify
routers


A-Layer Network
Management Principles
Motivating Example

Complex traffic/server interactions
Need to protect good traffic in this environment
Observations
Network topology, link dynamics, traffic volume
 Standard protocols (TCP, UDP), standard services
(NFS, DNS), rates, request/response completion rate,
latency, RTT, network load
 Sources/sinks of traffic, inside-vs-outside

Need for network-wide visibility despite traffic surges
and network stress
 We encode annotations that are removable and do not
reach endhosts
 These annotations are embedded in the flows they
describe, saving overhead and router resources
 Annotations result in path-wide context accompanying
packets along their network path to other iBoxes where it
is needed

iBox



iBox
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Prior Protocol
Type
Authentication Field
Authentication Field
(10 bytes)
Sequence Number
Destination Address
Source Address
Annotation Layer Payload
12 bytes of payload
in one AL unit
We can leverage IPsec standards to distribute shared
secrets to each iBox
 For authenticating annotations, we can rely on an
HMAC message authentication field
 Annotations are stackable


New policies (Actions)
 For experimental
intervention (root cause
discovery)
 To protect good traffic
 BW shaping, blocking,
scheduling, fencing,
selective drop
Security
 Against non-operators
using this infrastructure
 Against DoS attacks
 Alerting
operators
 SNMP traps when anomalous amount of traffic seen
 Acts as distributed monitoring system for path- and session statistics
 Experimental intervention
 Ability to affect unknown traffic and test result on good traffic
 Traffic management
 BW shaping, policing, fencing, selective drop, scheduling,
prioritization, network-level redirection
Research Challenges
And Opportunities
Annotation Structure and Security
AL unit headers (14 bytes)

Actions
Network statisics:
 Flow rates, protocol mixtures, top-talkers graph, “network hotspots”
 Correlations:
 Surge in one type of traffic correlated with drop in another
 Relationship between “good” network services and “unknown”
traffic
 Unusual behavior (change in mean)
 Is a network service seeing unusually low or high number of
requests?
A-Layer Piggybacking
iBox

Network-wide visibility despite
surges/overload/high loss rates
Low overhead
Path statistics gathering
Some protocol visibility (TCP, IP,
Services like DNS, NFS)
Need to discover
 Changes to request-reply rate,
completions, latency over time
 Correlations between different
flows, protocols, parts of the
network
Analysis

anno: X

The A-Layer can enable a distributed, network-wide observation
platform
 This enables statistics gathering, correlation discovery, path- and
session statistic gathering
 iBoxes can utilize the A-Layer for experimental intervention and new
policy implementation
 Through network-level actions such as bandwidth shaping and
fencing
 Hope is to protect good traffic during periods of network stress
