SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Dynamic Measurement-Aware
                         Routing in Practice
                   Guanyao Huang and Chen-Nee Chuah, University of California Davis
                                       Saqib Raza, Cisco Systems
                            Srini Seetharaman, Deutsche Telekom R&D Lab


                                                              Abstract
                       Traffic monitoring is a critical network operation for the purpose of traffic account-
                       ing, debugging or troubleshooting, forensics, and traffic engineering. Existing tech-
                       niques for traffic monitoring, however, tend to be suboptimal due to poor choice of
                       monitor location or constantly evolving monitoring objectives and traffic characteris-
                       tics. One way to counteract these limitations is to use routing as a degree of free-
                       dom to enhance monitoring efficacy, which we refer to as measurement-aware
                       routing. Traffic sub-populations can be routed (rerouted) on the fly to optimally
                       leverage existing monitoring infrastructures. Implementing dynamic measurement-
                       aware routing (DMR) in practice is riddled with challenges. Three major challenges
                       are how to dynamically assess the importance of traffic flows; how to aggregate
                       flows (and hence take a common action for them) in order to conserve routing
                       table entries; and how to achieve traffic routing/rerouting in a manner that is least
                       disruptive to normal network performance while maximizing the measurement utili-
                       ty. This article takes a closer look at these challenges and discusses how they man-
                       ifest for different types of networks. Through an OpenFlow prototype, we show
                       how DMR can be applied in enterprise networks. Using global iceberg detection
                       and capture as a driving application, we demonstrate how our solutions successful-
                       ly route suspected iceberg flows to a DPI box for further processing, while preserv-
                       ing balanced load distribution in the overall network.




A             ccurate and efficient network-wide traffic mea-
              surement presents multifaceted challenges. It
              involves not only configuring individual monitors
              for different measurement purposes (ranging from
inferring flow statistics [1] to heavy-hitter identification [2],
anomaly detection [3], and zooming in on traffic sub-popula-
tions [4]), but also deciding the placement of these monitors.
                                                                     monitors, MeasuRouting switches the route of flow 2 with
                                                                     another flow of similar size (flow 3), which enables the mea-
                                                                     surement of flow 2 while keeping the overall load balanced
                                                                     across the network. Reference [6] showcases the expected ben-
                                                                     efits of using routing to assist traffic measurements and how it
                                                                     it can be done without disrupting the network’s traffic engi-
                                                                     neering (TE) performance. However, MeasuRouting only
All previous work in the latter domain defines some expected         models a subset of the constraints a real-world deployment
utility function for the monitored traffic and a cost function for   faces, and the benefits should therefore be interpreted as best
the monitor deployment or operation. These functions are             case bounds for routing-assisted measurement. The theoretical
then used to identify the appropriate placement that delivers        framework in [6] deviates from practice in the following ways:
the most desired trade-off [5]. Such solutions typically assume      • It assumes a priori knowledge about presence of flows and
long-term traffic characteristics and use static monitoring             their importance, which is hard to predict in practice.
methods catering to specific traffic conditions. Hence, they are     • It assumes that any arbitrary subset of flows between an ori-
not capable of intelligently adapting to dynamic changes in             gin-destination (OD) pair can be aggregated to take a com-
traffic landscapes, network operating conditions, or measure-           mon forwarding action.
ment goals. It is quite possible for a flow of interest to avoid     • It ignores practical routing constraints imposed by the rout-
detection by not traversing the deployed monitoring boxes.              ing substrate. It uses linear programming (LP) to solve the
   We addressed the limitations of such inflexible monitoring           routing problem wherein each aggregate of flows may be
infrastructure in an earlier work called MeasuRouting [6],              arbitrarily divided across multiple paths as long as there are
which proposes to assist traffic monitoring by intelligently rout-      no loops.
ing traffic sub-populations over appropriate configured/             • It works on independent snapshots of the traffic matrix
deployed monitors. It uses routing as a degree of freedom to            without accounting for any flow arrival pattern, thereby
offset the disruptions caused by evolving measurement objec-            alleviating the need for rerouting.
tives or network/traffic characteristics. Figure 1 illustrates the      In this article, we investigate how dynamic measurement-
basic concept of MeasuRouting. We assume that only router B          aware routing (DMR) can be realized in practice. DMR over-
is equipped with measurement capability. Suppose the network         comes unpredictable changes in both traffic characteristics
operator is interested in monitoring flow 2, which does not tra-     and monitoring objectives by dynamically routing important
verse B using default routing. To utilize the existing (fixed)       traffic sub-populations to some preconfigured monitors. We


IEEE Network • May/June 2011                        0890-8044/11/$25.00 © 2011 IEEE                                                29
Flows                          Flows
            12 3 4                         13 2 4
                                                                   restricts our ability to make fine-grained monitoring-aware
                A                             A                    routing decisions. MeasuRouting [6] assumes that arbitrary
                                                                   sets of flows between the same OD pair can be aggregated
        C               B              C              B            into a flowset. It also assumes that the number of flows for
                                                                   each flowset follows a certain distribution. However, in reality,
                                                                   flowset aggregation is highly dependent on the underlying
                D                             D
                                                                   routing substrate. For instance, in longest-prefix-based IP for-
                                                                   warding a flowset is characterized by a destination IP prefix.
               (a)                            (b)                  DMR in practice must be cognizant of and obey all flow
                                                                   aggregation constraints of the underlying substrate.
Figure 1. MeasuRouting example: a) before MeasuRouting; b)            Dynamically routing and rerouting flowsets: The config-
  after MeasuRouting.                                              ured flowsets may need to be dynamically routed based on the
                                                                   learned or estimated flow importance. The objective is to
                                                                   maximize some utility function of measured flows while mini-
outline the challenges of DMR and build an OpenFlow [7]            mizing any cost incurred by deviating from the default routes.
based prototype for enterprise networks, which is tuned            These costs include additional path stretch and maximum link
toward a specific monitoring application: global iceberg detec-    utilization. In a dynamic setting, the importance of an existing
tion and capture. We use counters of OpenFlow switches to          flowset might change when its flows change properties or new
assess initial flow importance and route potential iceberg traf-   flows arrive. The resource occupied by an initially important
fic to a deep packet inspection (DPI) box, which is a typical      flowset may need to be allocated to a new or re-constructed
example of any costly and complicated measurement/inspec-          flowset. The cost, therefore, also includes the number and
tion task for important flows. We illustrate how iceberg flows     impact of routing table changes required to perform the
can be gracefully routed with little or no influence on network    rerouting. DMR in practice must solve the dynamic routing
performance. Our work serves as a first step to understand         problem in a timely fashion, minimizing disruption to network
and achieve a functional DMR architecture.                         performance whilst obeying flowset configuration constraints
   The rest of the article is organized as follows. We discuss     imposed by the routing substrate.
practical challenges for DMR in greater detail. We then pre-          The above challenges generalize to all kinds of underlying
sent our system architecture and solution algorithms, intro-       routing substrates and networks. Addressing these challenges
duce one example application, global iceberg detection and         link traffic engineering and monitoring together, making rout-
capture, describe experimental settings, and present evalua-       ing-assisted monitoring feasible in a dynamic environment.
tion results. We then conclude the article.
                                                                   DMR Proof of Concept
Challenges of DMR in Practice                                      To study the practical implementation issues of DMR, we pre-
In this section, we discuss three major challenges associated      sent an OpenFlow-based prototype that addresses the three
with realizing DMR in practice.                                    challenges. The prototype is designed for enterprise or data
   Dynamically inferring flow importance: The primary moti-        center networks. The motivation behind doing so is twofold.
vation behind routing-assisted measurement is to enable            First, we consider an enterprise network to be the ideal candi-
prompt reaction in dynamic environments. This involves             date for DMR. Administrators may have highly customized
changes in measurement objectives, network, or traffic charac-     and rapidly evolving measurement objectives in contrast to
teristics, of which one cannot assume any priori knowledge. In     more stable measurement requirements in backbone net-
DMR the inference of the flow importance (from a measure-          works. Furthermore, the traffic rates are low enough to
ment perspective) is a dynamic process, wherein measurement        attempt DMR without the high stakes involved in backbone
tasks are continuously fine-tuned based on the most up-to-         networks. Second, OpenFlow [7] has been shown to be a prac-
date information. Such a dynamic calculation/estimation of         tical control mechanism for enterprise or data center net-
flow importance is a key prerequisite for making routing/          works. The ability to dynamically program forwarding behavior
rerouting decisions. Coarser-grained measurements, such as         of network switches is an important feature that is leveraged
Simple Network Management Protocol (SNMP) statistics or            by our prototype.
uniform sampling [8], may be used to configure DMR to
direct traffic toward more sophisticated measurement instru-       OpenFlow Architecture
mentation (e.g., devices used for data streaming [9] or DPI).      OpenFlow is an open standard that decouples control from
The challenge faced by DMR is how to dynamically learn flow        switches in such a way that a remote controller can dynamical-
importance at distributed points and communicate it back to        ly change flow table entries on OpenFlow-enabled switches.
the routing control plane.                                         Each flow table entry has matching rules described by the fol-
   Aggregating flows into flowsets: Routing and forwarding         lowing 11 tuples in the packet:
table entries need to be conserved for a number of reasons.
For instance, only limited tertiary content addressable memo-
                                                                       < srcmac, dstmac, vlanid , vlan priority , type, >
ry (TCAM) or fast-memory resources are available to house
the routing table. Larger routing tables may also inflate the                           Data Link Layer
                                                                                          t
lookup latency. In practice, the number of routing table               < srcip, dstip, proto, tos, > < srcport , dstport , >
entries is conserved by aggregating flows into flowsets. We                   Network Layer               Transport Layer
define “flowset” as any aggregation of flows as long as they
share the same forwarding decisions. We refer to the problem         With OpenFlow architecture, a packet gets forwarded if it
of aggregating flows to flowsets as the flowset configuration      matches a flow-table entry. Whenever a new flow has no pre-
problem. One consequence of flowset aggregation is that            configured entry, the first packet will be forwarded to the con-
flows of the same flowset must take the same action (e.g., be      troller, which in turn calculates the route and populates
forwarded across the same port[s]). Aggregation, therefore,        corresponding flow-table entries. A flow-table entry can be


30                                                                                                           IEEE Network • May/June 2011
specified by the above 11 tuples with an additional field            individual flow importance. We assign the m most important
denoting the incoming port of the packet. Certain fields can         flows to the m flowsets such that they can be routed different-
be wildcarded (i.e., unspecified) to aggregate flows into            ly from common flows. This is achieved by setting the fields of
flowset. The controller can also query the switches for an           the TCAM dataword equal to the 12 tuples. All common
update of flowset statistics. When there is no packet matching       flows are mapped to one of the n flowsets, which are con-
an entry for a certain period, the entry automatically gets          structed by wildcarding certain fields of the TCAM dataword.
deleted and a flow-expire message containing statistics of the       In OpenFlow, TCAM entries with exact matches always take
expired entry will be sent to the controller. The statistics col-    the highest priority; the m important flows will not be for-
lected from flowquery and flow-expire messages can be direct-        warded by any of the n flowset rules.
ly used by the controller to control flowset routing.
   We now discuss how each of the challenges enumerated              Flowset Routing
earlier is addressed in our prototype solution.                      In our proof-of-concept DMR implementation, we investigate
                                                                     one simple heuristic solution for the flowset routing problem.
Learning Flow Importance                                             It is an extension of 1/R routing [11]. In 1/R routing, link
For many applications, flow importance is estimated by the size      weights are assigned to be the reciprocal of residual link
of flows. Example applications include detection of elephant         bandwidth, and then the shortest paths are computed for all
flows and traffic churns, and estimation of flow size distribution   node pairs. In OpenFlow, the controller can periodically
[9]. In OpenFlow, collecting flow sizes is easy if we have an        query each link’s utilization. We assume 1/R routing to be the
unconstrained number of flow table entries, since one flow           default case, which is reasonable if the operator intends to
table entry corresponds to a single flow. The controller can         distribute the traffic evenly across the network. The paths cal-
retrieve the byte/packet counts for each flow using flow-            culated in this way are referred to as 1/R paths. We devise
query/flow-expire messages in the OpenFlow protocol. Howev-          concatenated 1/R routing (CR) to route important flowsets, as
er, in practice, multiple flows are grouped into a flowset, and      explained in the following. The definition of “important” is
the flowset corresponds to a single flow table entry. Conse-         specific to different measurement applications.
quently, byte/packet counts are aggregated over many flows. To           CR is designed for the case where there is only one monitor in
overcome this, our prototype periodically disaggregates a small      the network. It chooses the path with the smaller cost (in terms of
portion of flowset entries into entries of individual flows, based   sum of link weights) from the following two candidate paths. The
on flowset statistics. It then maintains/queries individual flow     first candidate path is a concatenation of a subpath from the src
statistics for a certain period to estimate their importance. The    switch to the monitor, and the other is a subpath from the moni-
procedure is repeated such that every flow gets its importance       tor to the dst switch. Both subpaths are calculated by 1/R routing,
estimated. In DMR, the estimated important flows will be rout-       and loops are avoided by iteratively excluding already selected
ed to more complicated monitors for better measurement. It           switches. The second candidate path is constructed in a similar
tolerates estimation errors in assessing flow importance.            manner, with a reversed order of calculating the two subpaths.
                                                                         In the case where there are multiple monitors, we propose
Flowset Configuration                                                another heuristic solution called weighted 1/R routing (WR).
As mentioned earlier, flow table rules can be exactly specified      WR assigns link weight as the reciprocal of a monitor weight
by the 12-tuples or wildcarded to aggregate flows into flowsets.     multiplied by residual link bandwidth. The monitor weight is
The rules are described using datawords in a TCAM. In order          large for links attached to the monitor and small for all other
to map a set of flows into the same flow-table entry, we             links. The smaller link weight for the links attached to the mon-
require that a TCAM dataword be wildcarded on certain                itor will attract traffic toward it. These modified link weights
tuples. TCAMs allow all or a subset of the bits in the data          are used to compute the shortest path for important flowsets.
search word to have a “don’t care” state (i.e., any value for        Our initial results show the the performance of CR and WR
that bit will count as a match). This allows a single TCAM           are comparable for a single-monitor case. For simplicity and
dataword to possibly match multiple flows. The current Open-         illustration purposes, we only present CR in our evaluation.
Flow release imposes restrictions on how the “don’t care” bits           In DMR, flowsets might get rerouted once their impor-
are set. All the fields except mac and ip addresses may be           tance and network conditions are dynamically updated. There-
constrained to have either all their bits specified as “don’t        fore, we consider the following two variations for CR:
care” or none at all. The mac and ip fields can specify a post-      • R, reroute existing flowsets if their importance changes.
fix of its bit string to be “don’t care.” These constraints          • NR, do not reroute existing flowsets even if some of them
restrict the flexibility to configure flowsets, but must be             become important, but only route a new flowset in a moni-
adhered to while deploying a practical solution.                        tor-aware manner.
   Furthermore, our enterprise networks has flat layer 2             In order to avoid congestion, we amortize the redirection
addressing as opposed to hierarchical layer 3 addressing. This       tasks over time. In our experiment, we find that there is no
limits our ability to aggregate flows that are destined for a        need to explicitly reroute unimportant flows for load balanc-
common egress switch. In order to solve this problem, we             ing. Amortizing redirection tasks is sufficient.
leverage on the solution in [10], which proposes to use a hier-          To summarize, our DMR prototype implemented in Open-
archical pseudo medium access control (PMAC) address to              Flow conducts the following procedures:
encode a host’s position in the topology. All hosts behind a         • It iteratively splits flowset entries into small entries for indi-
switch will have the same prefix in their assigned PMAC                 vidual flows. It learns, estimates, and updates the impor-
addresses. The hosts remain oblivious to the assigned PMAC              tance of flows by querying switches or utilizing flow-expire
addresses, with their associated switches performing the                messages. Important flows are routed using a separate flow
appropriate PMAC to MAC header rewriting. The solution                  table entry while the rest are aggregated.
allows OpenFlow to group together flows destined to the              • It routes new flows as they arrive based on known flow/
same egress switch into the same flowset.                               flowset information. This includes deciding whether/how to
   As mentioned earlier, there is a budgeted number (b = m              group the flow into a flowset and how to route the flowset.
+ n) of flowsets (TCAM entries per switch) for each OD pair.            It reroutes/reconfigures existing flowsets based on dynamic
We allocate n of these flowsets for default routing and learn           traffic conditions.


IEEE Network • May/June 2011                                                                                                          31
Internet         Gateway
                                                                      topology is typical for a tree-like enterprise network where
                                                DPI box               the central gateway is at the top layer. We assume there is
                                                                      only one DPI box (monitor) in the network. We use packet
                                                     Core layer       level traces from the Lawrence Berkeley National Laboratory
                                                                      campus network [12]. We replay one trace to each switch with
                                                                      moderate rate (around 60 packets/s from each switch) to imi-
                                                     Distribution     tate a real OpenFlow-enabled campus network. The small
                                                         layer
                                                                      rate is due to current limitations on the number of entries
                                                                      (around 1500) per OpenFlow switch. Our prototype can sup-
                                                                      port larger data rates with an increased entry number sup-
                                                                      ported by the switch. We also scale link bandwidth such that
                                                                      the maximum link utilization (MLU) is around 20 percent.
                                                                          In our experiment, we estimate iceberg identities on the fly
                             Access layer
                                                                      based on most recent measurement; for example, an nw_dst is
                                                                      suspected to be an iceberg if its size is larger than μ fraction of
Figure 2. Experiment topology.
                                                                      current traffic volume. We vary iceberg threshold from μ = 1
                                                                      percent → 5 percent. Once a flow or flowset is estimated to be
                                                                      important (i.e., part of an iceberg in this case), we apply DMR
DMR Case Study: Capturing Global                                      to route it toward the DPI box. We describe the various
Icebergs                                                              flowset configuration and routing scenarios in the next section.
                                                                         Besides Δβ, we are also interested in the following cost metrics:
To showcase the effectiveness of our OpenFlow-based DMR               • ΔMLU: We consider maximum link utilization (MLU) as our
prototype, we consider one driving measurement application:              traffic engineering (TE) metric and define ΔMLU as MLUDMR
global iceberg detection and capture. A global iceberg is defined        – MLU default ; that is, the difference between MLU when
to be an “item” whose aggregated count value is above a cer-             DMR is deployed and MLU when default routing is used.
tain threshold. In this article, we define the “item” to be all       • κ: The number of rule changes needed to perform rerouting.
flows destined to the same nw_dst (IP destination address),           • L: Average hop count for all the flows.
that is, an nw_dst that attracts a lot of traffic (larger than μ         Other performance metrics include average packet delay
fraction of total amount) from distributed hosts. Such icebergs       and throughput. In OpenFlow, it takes around 10 ms to create
are of interest for different network management tasks, such          a flow table entry per flow. Such delay is trivial because only
as detecting a distributed denial of service attack or identify-      the first packet will trigger the entry write. Since there is no
ing botnet command and control traffic. Detailed security             packet loss, the packet delay is closely related to L, and the
analysis (e.g., DPI) allows postmortem analysis of events seen        overall throughput stays the same.
in the network and payload properties of the iceberg traffic in
order to determine its potential source. However, capturing           Experiment Scenarios
payload is often an expensive process that requires dedicated         Since we rely on OpenFlow counters (associated with flowset
hardware or vast storage capacity for captured traces. As a           entries) to estimate the size of flowsets, the choice of flowset
result, operators can rarely afford to deploy DPI agents at           configuration has an impact on how well DMR assesses the
every single node. Instead, a handful of DPI boxes are placed         importance of flows. To benchmark the performance of
at strategic locations with limited storage resources. Hence, it      DMR, we consider the following three experiment scenarios.
is desirable to route flows destined to iceberg nw_dst across            (Case 1) Flow routing: In flow routing, each entry in an
these DPI boxes installed at selected locations.                      OpenFlow switch is defined for an exact match of 12 tuples;
   In our case study, we deploy DMR to learn the existence of         that is, each flow has its own flow table (flowset) entry regard-
a global iceberg and reroute the flows belonging to the iceberg       less of its importance. Each flow has its estimated utility I*      x
toward the DPI box. To assess the quality of the traces captured      calculated in the same way as I x , based on current size of
for subsequent DPI, we define flow utility Ix to be the propor-       nw_dst and traffic volume. Based on I*, CR directly forwards
                                                                                                               x
tion of the size of its nw_dst and μ of total traffic amount if the   estimated iceberg flows to the DPI box. Flow routing is the
nw_dst is the iceberg; otherwise, it is 0. Ix is calculated offline   finest granularity for flowset configuration, thereby providing
to present the ground truth. We use b to denote the measure-          the prototype with greatest control and highest expectation of
ment utility gained by capturing iceberg flows,                       monitoring improvement. The downside of this approach is
                                                                      that it requires a large number of flow table entries, and
     β = ∑ I xε * ,
                x                                                     hence may not be feasible in practice.
          x                                                              (Case 2) Static flowset routing: In this approach, flows are
where ε* is the packet number for flow x that is forwarded to
         x                                                            grouped into flowsets by wildcarding certain fixed tuples. In
the DPI box. We define the measurement improvement as a               our setting, the flow table entries are matched to 6 tuples:
ratio, Δ β = (β DMR – β default)/β default, where β DMR is the mea-   dl_type, dl_vlan, dl_src, dl_dst, in port and the wildcarded
surement utility gained with DMR, and β default is the utility        nw_dst. We ignore following fields of the 6 tuples: nw_proto,
achieved by default routing.                                          nw_src, tp_src, tp_dst, nw_tos, dl_vlan_pcp. We assign the same
                                                                      PMAC [8] dl_src/dl_dst address to all the flows initiated
Testbed Setup and Performance Metrics                                 from/to the same switch. We do not ignore nw_dst since it is
The current release of OpenFlow is more suitable for han-             used to define an iceberg. However, we wildcard the last 26
dling enterprise network due to its limited number of TCAM            bits of it to save entry numbers. In reality, dl_dst itself is suffi-
entries (around 2000) used to create the flow table. To test          cient to forward packets to the destination switch. However,
DMR on OpenFlow, we would ideally have complete layer 2               such high-level aggregation prevents us from learning more
topologies of enterprises and traces on every link. Unfortu-          detailed flow information. Our wildcarding saves 66 percent of
nately, such information is not accessible due to privacy con-        entries compared to flow routing. Due to aggregation, individ-
cerns. Instead, we build a topology as shown in Fig. 2. The           ual flow sizes are no longer visible. Since the OpenFlow


32                                                                                                         IEEE Network • May/June 2011
0.6
counter is associated with flowset entries, the estimated size is
for aggregated flows that share the same entry.                                                                     0.5




                                                                                      Δβ: Measurement improvement
   To calculate flowset utility we define nw_dst* to be the
wildcarded nw_dst. There are therefore 64 (2 32–26) distinct                                                        0.4
nw_dst*. A flowset is important if its nw_dst* is among the
most popular (i.e., its size is larger than μ* of total count).                                                     0.3
Similar to I*, we calculate the estimated utility for nw_dst*
              x
and perform CR accordingly.                                                                                         0.2
   Note that there is a mismatch between μ* and μ since μ* is
defined for wildcarded flowsets; that is, because an nw_dst is                                                      0.1
important does not necessarily mean its nw_dst* is also big. It
is therefore difficult to decide a proper μ*. We test the per-                                                       0
formance on different μ*, but only present results for μ* = 5                                                             0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05
                                                                                                                                                  μ
percent and μ = 1 percent → 5 percent earlier.
   (Case 3) Dynamic flowset routing: Here, flows are grouped                                   0.012
into flowsets in the same way as in static flowset routing,
except that the module now periodically splits some of the
                                                                                                                    0.1
flowset entries to query statistics of individual flows (as
described earlier). The sizes of individual nw_dst then become




                                                                         ΔMLU: MLU increase
visible. A flow will be routed separately once it is estimated to                              0.008
be an iceberg (hence important), while common flows can be
aggregated again to share one wildcarded entry and perform                                     0.006
1/R routing. Note that we only need to split the flowset at one
switch to learn flow sizes, and keep the same flowset configu-                                 0.004
rations at other switches.
   Dynamic flowset routing maintains three separate identities:
                                                                                               0.002
OF (ordinary flowsets), CF (candidate flowsets), and IF (impor-
tant flows). CF are the flowsets that divide their entries at one
switch to learn individual flow sizes. For each period (20 s in our                                                  0
                                                                                                                          0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05
experiment), the module performs three tasks. First, it reclassi-                                                                                 μ
fies some flows from CF to IF if the rate of nw_dst for the flow
is larger than μ of overall traffic rate. Second, it moves the
remaining CF back into OF. Common flows of previous CF will                                                         2.5
again be aggregated by wildcarded flowsets. Lastly, it selects
some nw_dst* and their corresponding OF into CF. In our pro-
                                                                                                                     2
gram we pick one random nw_dst* and the largest (more than
                                                                                           L: Average hop count




μ* of traffic amount) nw_dst*s, and partition their correspond-
ing flowsets into CF. It then splits CF’s entries to access individ-                                                1.5
ual flow importance. Every wildcarded flowset uses 1/R routing,
while important flows are routed toward the DPI box with CR.                                                         1

Evaluation Results
                                                                                                                    0.5                               Flow routing
We now present evaluation results for the three scenarios                                                                                             Static flowset-routing
using CR routing with NR and R variations.                                                                                                            Dynamic flowset-routing
                                                                                                                     0
                                                                                                                          0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05
Advantage of Dynamic Flowset Configuration — We first com-                                                                                        μ
pare the performance of dynamic flowset routing against flow
routing and static flowset routing in Fig. 3, using the CR/NR          Figure 3. Advantage of dynamic FlowSet-Routing.
routing algorithm. Since NR derivation does not redirect traf-
fic, κ remains 0 for all three cases, and the graph is omitted.
   We generally see large measurement improvement (from
25 to nearly 80 percent), while the increase of σ is very small        by around 0.006 ms/packet for dynamic flowset routing com-
(from 0.025 to 0). We make the following four observations.            pared to static flowset routing.
First, flow routing achieves the most measurement gain. This              Compared to flow routing, the greatest benefit of dynamic
is because it utilizes the finest granularity in querying counter      flowset routing is the small number of table entries. Com-
statistics and routing. Second, the measurement improvement            pared to static flowset routing, the measurement improvement
for static flowset routing is less than flow routing or dynamic        of dynamic flowset routing is higher. Dynamic flowset routing
flowset routing. In static flowset routing, some iceberg flows         demonstrates the most common practice of DMR in traffic
do not belong to the important flowset defined based on μ*             measurement where no prior iceberg identity of accurate ini-
and thus are not routed through the DPI box. Third, due to             tial measurements of flow sizes are available. It achieves a
the tree-like topology, all three cases achieve very close L           nice trade-off between measurement improvement and the
(average hop count). Finally, the maximum entry number for             number of flowset table entries.
flow routing is around 700 over time. This number is reduced
to around 200 for static flowset routing, but increases to             Advantage of Rerouting — We next present the advantage of
around 300 for dynamic flowset routing. The increased entry            rerouting traffic by the CR/R routing algorithm in Fig. 4. Since
number reflects larger average delay since it takes longer to          L changes little, we omit its graph and present results for κ.
set up entries. In our settings, the average delay is increased           Compared to CR/NR, the measurement improvement is


IEEE Network • May/June 2011                                                                                                                                                    33
Δβ: Measurement improvement
                                                  0.8                                                           Concluding Remarks
                                                                                                                In this article we propose dynamic measurement-aware rout-
                                                  0.6                                                           ing for network-wide traffic measurement. It overcomes the
                                                                                                                varying nature of both traffic characteristics and measurement
                                                                                                                objectives by intelligently routing important traffic sub-popu-
                                                  0.4
                                                                                                                lations to some preconfigured monitors. The whole procedure
                                                                                                                therefore involves initial assessment of flow importance,
                                                  0.2                                                           flowset configuration, and flowset routing with considerations
                                                                                                                of overall network performances. We discuss the challenges of
                                                                                                                implementing DMR in practice, build a prototype solution on
                                                   0                                                            OpenFlow for global iceberg detection and capture, and eval-
                                                          0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05
                                                                                  μ
                                                                                                                uate its performance using real traces.
                                                                                                                   We evaluate three situations: flow routing, static flowset
                                                                                                                routing, and dynamic flowset routing. They vary from the case
                                                                                                                of finest granularity of routing control to the case of real prac-
                                      0.02                                                                      tice that can be commonly implemented. We generally see
                                                                                                                large measurement gain of iceberg detection, while network
     ΔMLU: MLU increase




                                                                                                                performance is preserved at decent levels. Our future work
                           0.015                                                                                includes exploring other measurement applications on Open-
                                                                                                                Flow and implementing DMR on IP networks.
                                      0.01                                                                      References
                                                                                                                [1] C. Estan et al., “Building a Better NetFlow,” Proc. ACM Sigcomm, Portland,
                                                                                                                    OR, Sept. 2004.
                           0.005                                                                                [2] C. Estan and G. Varghese, “New Directions in Traffic Measurement and
                                                                                                                    Accounting: Focusing on the Elephants, Ignoring the Mice,” ACM Trans.
                                                                                                                    Comp. Sys., vol. 21, no. 3, Aug. 2003, pp. 270–313.
                                                                                                                [3] J. Mai et al. , “Is Sampled Data Sufficient for Anomaly Detection?,” Proc.
                                                   0                                                                ACM SIGCOMM IMC, Rio de Janeiro, Brazil, Oct. 2006.
                                                          0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05
                                                                                                                [4] L. Yuan, C.-N. Chuah, and P. Mohapatra, “ProgME: Towards Programmable
                                                                                  μ                                 Network Measurement,” Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.
                                                                                                                [5] K. Suh et al., “Locating Network Monitors: Complexity, Heuristics and Cover-
                                                                                                                    age,” Proc. IEEE INFOCOM, Miami, FL, Mar. 2005.
                                                                                      Flow routing              [6] S. Raza et al. , “Measurouting: A Framework for Routing Assisted Traffic
                                            400                                       Static flowset-routing        Monitoring,” Proc. IEEE INFOCOM, San Diego, CA, June 2010.
                                                                                      Dynamic flowset-routing   [7] The Open Flow Switch Consortium, http://www.openflowswitch.org, Aug.
                κ: Number of rule changes




                                                                                                                    2010.
                                            300                                                                 [8] “Sampling and Filtering Techniques for IP Packet Selection,” Internet draft
                                                                                                                    draft-ietf-psamp-sample-tech-11.txt, work in progress, July 2008.
                                                                                                                [9] A. Kumar et al., “Data Streaming Algorithms for Efficient and Accurate Estimation
                                                                                                                    of Flow Size Distribution,” ACM Sigmetrics, New York, NY, June 2004.
                                            200                                                                 [10] R. N. Mysore et al. , “Portland: A Scalable Fault- Tolerant Layer 2 Data
                                                                                                                    Center Network Fabric,” Proc. ACM SIGCOMM, New York, NY, June 2009.
                                                                                                                [11] E.-S. Jung et al., “An Evaluation of In-Advance Bandwidth Scheduling Algo-
                                                                                                                    rithms for Connection-Oriented Networks,” Proc. Int’l. Symp. Parallel Archi-
                                            100                                                                     tectures, Algorithms, and Networks, 0:133-138, May 2008.
                                                                                                                [12] Lbnl enterprise trace repository, http://www.icir.org/enterprise-tracing/,
                                                                                                                    Aug. 2010.
                                                   0
                                                        0 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05      Biographies
                                                                                  μ                             GUANYAO HUANG (gyhuang@ucdavis.edu) is a fourth year Ph.D. candidate in
                                                                                                                the Department of Electrical Computer Engineering, University of California,
Figure 4. Advantage of rerouting traffic.                                                                       Davis. His current research focuses on network measurement and anomaly detec-
                                                                                                                tion. He completed his undergraduate and postgraduate degree from the Univer-
                                                                                                                sity of Science and Technology, China.

even higher (from 30 to nearly 100 percent), while the increase                                                 SAQIB RAZA (sraza@ucdavis.edu) received his B.S. degree in computer science
of σ is still kept at low levels (from 0.03 to 0.005). We make                                                  from Lahore University of Management Sciences in 2004, and Ph.D. and M.S.
                                                                                                                degrees in computer science from the University of California, Davis in 2007
the following three observations. First, CR/R has better mea-                                                   and 2010, respectively. He is a software engineer at the Data Center Switching
surement improvement than CR/NR. In CR/NR, consistent                                                           Technology Group in Cisco Systems, San Jose, California.
iceberg flows will not be captured by the DPI box if it initially
did not traverse it. Second, similar to Fig. 3, flow routing                                                    SRINI SEETHARAMAN (srini084@gmail.com) is a member of the Clean Slate Labo-
                                                                                                                ratory at Stanford University and a senior research scientist with Deutsche
achieves the largest measurement improvement, while static                                                      Telekom R&D Lab, Los Altos, California. He holds a Ph.D. in computer science
flowset routing is the worst. Finally, the number of required                                                   from Georgia Institute of Technology and a Master’s degree in computer science
rule changes, κ, is larger in dynamic flowset routing than in                                                   from The Ohio State University. His research interests include networking archi-
the others. This is because the estimation of iceberg identities                                                tectures and protocols, overlay networks, traffic/network monitoring, and green
                                                                                                                technologies.
is not as accurate as in flow routing. Some non-iceberg flows
are also redirected to the DPI box.                                                                             CHEN-NEE CHUAH (chuah@ucdavis.edu) is a professor in electrical and computer
   Results generally suggest that rerouting traffic is useful to                                                engineering at the University of California, Davis. She received her B.S. from
achieve a larger measurement gain, but at the cost of huge churns                                               Rutgers University, and her M.S. and Ph.D. in electrical engineering and comput-
                                                                                                                er Sciences from the University of California, Berkeley. Her research interests lie
in terms of number of changes in forwarding rules. Rerouting                                                    in the area of communications and computer networks, with emphasis on Internet
does not necessarily introduce large σ, since the default 1/R rout-                                             measurements, network management, cyber-security, online social networks, and
ing can distribute load away from congested links.                                                              vehicular ad hoc networks.



34                                                                                                                                                           IEEE Network • May/June 2011

Weitere ähnliche Inhalte

Was ist angesagt?

MMSE Receiver for DS/CDMA Communications
MMSE Receiver for DS/CDMA CommunicationsMMSE Receiver for DS/CDMA Communications
MMSE Receiver for DS/CDMA Communications
thesky118
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
journalBEEI
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
IJCERT
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
IJMER
 

Was ist angesagt? (20)

Routing in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space TechniqueRouting in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space Technique
 
94
9494
94
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
 
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
 
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Adaptive Handoff Initiation Scheme in Heterogeneous Network
Adaptive Handoff Initiation Scheme in Heterogeneous NetworkAdaptive Handoff Initiation Scheme in Heterogeneous Network
Adaptive Handoff Initiation Scheme in Heterogeneous Network
 
MMSE Receiver for DS/CDMA Communications
MMSE Receiver for DS/CDMA CommunicationsMMSE Receiver for DS/CDMA Communications
MMSE Receiver for DS/CDMA Communications
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANETIRJET-  	  Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
 
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet lossMM-PNEMO: a mathematical model to assess handoff delay and packet loss
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
 
Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications
 
87
8787
87
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
B0960512
B0960512B0960512
B0960512
 
Performance evaluation of gsm handover traffic in a gprsgsm network
Performance evaluation of gsm handover traffic in a gprsgsm networkPerformance evaluation of gsm handover traffic in a gprsgsm network
Performance evaluation of gsm handover traffic in a gprsgsm network
 
Rsaodv a route stability based ad hoc on demand distance vector routing prot...
Rsaodv  a route stability based ad hoc on demand distance vector routing prot...Rsaodv  a route stability based ad hoc on demand distance vector routing prot...
Rsaodv a route stability based ad hoc on demand distance vector routing prot...
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
 

Andere mochten auch

Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
ingenioustech
 

Andere mochten auch (8)

On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocol
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
Applied research of e learning
Applied research of e learningApplied research of e learning
Applied research of e learning
 
Intrution detection
Intrution detectionIntrution detection
Intrution detection
 

Ähnlich wie Dynamic measurement aware

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Mohammad Siraj
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
M H
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
IAEME Publication
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
Basil John
 

Ähnlich wie Dynamic measurement aware (20)

SPROJReport (1)
SPROJReport (1)SPROJReport (1)
SPROJReport (1)
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Mahout low-overhead datacenter traffic management using end-host-based ...
Mahout   low-overhead  datacenter  traffic management  using end-host-based  ...Mahout   low-overhead  datacenter  traffic management  using end-host-based  ...
Mahout low-overhead datacenter traffic management using end-host-based ...
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Deploying Distributed Traffic Capture Systems
Deploying Distributed Traffic Capture SystemsDeploying Distributed Traffic Capture Systems
Deploying Distributed Traffic Capture Systems
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 

Mehr von ingenioustech

Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
ingenioustech
 

Mehr von ingenioustech (18)

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
Tcp
TcpTcp
Tcp
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Peace
PeacePeace
Peace
 
Online social network
Online social networkOnline social network
Online social network
 
Layered approach
Layered approachLayered approach
Layered approach
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Active reranking for web image search
Active reranking for web image searchActive reranking for web image search
Active reranking for web image search
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_control
 
Vebek
VebekVebek
Vebek
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Dynamic measurement aware

  • 1. Dynamic Measurement-Aware Routing in Practice Guanyao Huang and Chen-Nee Chuah, University of California Davis Saqib Raza, Cisco Systems Srini Seetharaman, Deutsche Telekom R&D Lab Abstract Traffic monitoring is a critical network operation for the purpose of traffic account- ing, debugging or troubleshooting, forensics, and traffic engineering. Existing tech- niques for traffic monitoring, however, tend to be suboptimal due to poor choice of monitor location or constantly evolving monitoring objectives and traffic characteris- tics. One way to counteract these limitations is to use routing as a degree of free- dom to enhance monitoring efficacy, which we refer to as measurement-aware routing. Traffic sub-populations can be routed (rerouted) on the fly to optimally leverage existing monitoring infrastructures. Implementing dynamic measurement- aware routing (DMR) in practice is riddled with challenges. Three major challenges are how to dynamically assess the importance of traffic flows; how to aggregate flows (and hence take a common action for them) in order to conserve routing table entries; and how to achieve traffic routing/rerouting in a manner that is least disruptive to normal network performance while maximizing the measurement utili- ty. This article takes a closer look at these challenges and discusses how they man- ifest for different types of networks. Through an OpenFlow prototype, we show how DMR can be applied in enterprise networks. Using global iceberg detection and capture as a driving application, we demonstrate how our solutions successful- ly route suspected iceberg flows to a DPI box for further processing, while preserv- ing balanced load distribution in the overall network. A ccurate and efficient network-wide traffic mea- surement presents multifaceted challenges. It involves not only configuring individual monitors for different measurement purposes (ranging from inferring flow statistics [1] to heavy-hitter identification [2], anomaly detection [3], and zooming in on traffic sub-popula- tions [4]), but also deciding the placement of these monitors. monitors, MeasuRouting switches the route of flow 2 with another flow of similar size (flow 3), which enables the mea- surement of flow 2 while keeping the overall load balanced across the network. Reference [6] showcases the expected ben- efits of using routing to assist traffic measurements and how it it can be done without disrupting the network’s traffic engi- neering (TE) performance. However, MeasuRouting only All previous work in the latter domain defines some expected models a subset of the constraints a real-world deployment utility function for the monitored traffic and a cost function for faces, and the benefits should therefore be interpreted as best the monitor deployment or operation. These functions are case bounds for routing-assisted measurement. The theoretical then used to identify the appropriate placement that delivers framework in [6] deviates from practice in the following ways: the most desired trade-off [5]. Such solutions typically assume • It assumes a priori knowledge about presence of flows and long-term traffic characteristics and use static monitoring their importance, which is hard to predict in practice. methods catering to specific traffic conditions. Hence, they are • It assumes that any arbitrary subset of flows between an ori- not capable of intelligently adapting to dynamic changes in gin-destination (OD) pair can be aggregated to take a com- traffic landscapes, network operating conditions, or measure- mon forwarding action. ment goals. It is quite possible for a flow of interest to avoid • It ignores practical routing constraints imposed by the rout- detection by not traversing the deployed monitoring boxes. ing substrate. It uses linear programming (LP) to solve the We addressed the limitations of such inflexible monitoring routing problem wherein each aggregate of flows may be infrastructure in an earlier work called MeasuRouting [6], arbitrarily divided across multiple paths as long as there are which proposes to assist traffic monitoring by intelligently rout- no loops. ing traffic sub-populations over appropriate configured/ • It works on independent snapshots of the traffic matrix deployed monitors. It uses routing as a degree of freedom to without accounting for any flow arrival pattern, thereby offset the disruptions caused by evolving measurement objec- alleviating the need for rerouting. tives or network/traffic characteristics. Figure 1 illustrates the In this article, we investigate how dynamic measurement- basic concept of MeasuRouting. We assume that only router B aware routing (DMR) can be realized in practice. DMR over- is equipped with measurement capability. Suppose the network comes unpredictable changes in both traffic characteristics operator is interested in monitoring flow 2, which does not tra- and monitoring objectives by dynamically routing important verse B using default routing. To utilize the existing (fixed) traffic sub-populations to some preconfigured monitors. We IEEE Network • May/June 2011 0890-8044/11/$25.00 © 2011 IEEE 29
  • 2. Flows Flows 12 3 4 13 2 4 restricts our ability to make fine-grained monitoring-aware A A routing decisions. MeasuRouting [6] assumes that arbitrary sets of flows between the same OD pair can be aggregated C B C B into a flowset. It also assumes that the number of flows for each flowset follows a certain distribution. However, in reality, flowset aggregation is highly dependent on the underlying D D routing substrate. For instance, in longest-prefix-based IP for- warding a flowset is characterized by a destination IP prefix. (a) (b) DMR in practice must be cognizant of and obey all flow aggregation constraints of the underlying substrate. Figure 1. MeasuRouting example: a) before MeasuRouting; b) Dynamically routing and rerouting flowsets: The config- after MeasuRouting. ured flowsets may need to be dynamically routed based on the learned or estimated flow importance. The objective is to maximize some utility function of measured flows while mini- outline the challenges of DMR and build an OpenFlow [7] mizing any cost incurred by deviating from the default routes. based prototype for enterprise networks, which is tuned These costs include additional path stretch and maximum link toward a specific monitoring application: global iceberg detec- utilization. In a dynamic setting, the importance of an existing tion and capture. We use counters of OpenFlow switches to flowset might change when its flows change properties or new assess initial flow importance and route potential iceberg traf- flows arrive. The resource occupied by an initially important fic to a deep packet inspection (DPI) box, which is a typical flowset may need to be allocated to a new or re-constructed example of any costly and complicated measurement/inspec- flowset. The cost, therefore, also includes the number and tion task for important flows. We illustrate how iceberg flows impact of routing table changes required to perform the can be gracefully routed with little or no influence on network rerouting. DMR in practice must solve the dynamic routing performance. Our work serves as a first step to understand problem in a timely fashion, minimizing disruption to network and achieve a functional DMR architecture. performance whilst obeying flowset configuration constraints The rest of the article is organized as follows. We discuss imposed by the routing substrate. practical challenges for DMR in greater detail. We then pre- The above challenges generalize to all kinds of underlying sent our system architecture and solution algorithms, intro- routing substrates and networks. Addressing these challenges duce one example application, global iceberg detection and link traffic engineering and monitoring together, making rout- capture, describe experimental settings, and present evalua- ing-assisted monitoring feasible in a dynamic environment. tion results. We then conclude the article. DMR Proof of Concept Challenges of DMR in Practice To study the practical implementation issues of DMR, we pre- In this section, we discuss three major challenges associated sent an OpenFlow-based prototype that addresses the three with realizing DMR in practice. challenges. The prototype is designed for enterprise or data Dynamically inferring flow importance: The primary moti- center networks. The motivation behind doing so is twofold. vation behind routing-assisted measurement is to enable First, we consider an enterprise network to be the ideal candi- prompt reaction in dynamic environments. This involves date for DMR. Administrators may have highly customized changes in measurement objectives, network, or traffic charac- and rapidly evolving measurement objectives in contrast to teristics, of which one cannot assume any priori knowledge. In more stable measurement requirements in backbone net- DMR the inference of the flow importance (from a measure- works. Furthermore, the traffic rates are low enough to ment perspective) is a dynamic process, wherein measurement attempt DMR without the high stakes involved in backbone tasks are continuously fine-tuned based on the most up-to- networks. Second, OpenFlow [7] has been shown to be a prac- date information. Such a dynamic calculation/estimation of tical control mechanism for enterprise or data center net- flow importance is a key prerequisite for making routing/ works. The ability to dynamically program forwarding behavior rerouting decisions. Coarser-grained measurements, such as of network switches is an important feature that is leveraged Simple Network Management Protocol (SNMP) statistics or by our prototype. uniform sampling [8], may be used to configure DMR to direct traffic toward more sophisticated measurement instru- OpenFlow Architecture mentation (e.g., devices used for data streaming [9] or DPI). OpenFlow is an open standard that decouples control from The challenge faced by DMR is how to dynamically learn flow switches in such a way that a remote controller can dynamical- importance at distributed points and communicate it back to ly change flow table entries on OpenFlow-enabled switches. the routing control plane. Each flow table entry has matching rules described by the fol- Aggregating flows into flowsets: Routing and forwarding lowing 11 tuples in the packet: table entries need to be conserved for a number of reasons. For instance, only limited tertiary content addressable memo- < srcmac, dstmac, vlanid , vlan priority , type, > ry (TCAM) or fast-memory resources are available to house the routing table. Larger routing tables may also inflate the Data Link Layer t lookup latency. In practice, the number of routing table < srcip, dstip, proto, tos, > < srcport , dstport , > entries is conserved by aggregating flows into flowsets. We Network Layer Transport Layer define “flowset” as any aggregation of flows as long as they share the same forwarding decisions. We refer to the problem With OpenFlow architecture, a packet gets forwarded if it of aggregating flows to flowsets as the flowset configuration matches a flow-table entry. Whenever a new flow has no pre- problem. One consequence of flowset aggregation is that configured entry, the first packet will be forwarded to the con- flows of the same flowset must take the same action (e.g., be troller, which in turn calculates the route and populates forwarded across the same port[s]). Aggregation, therefore, corresponding flow-table entries. A flow-table entry can be 30 IEEE Network • May/June 2011
  • 3. specified by the above 11 tuples with an additional field individual flow importance. We assign the m most important denoting the incoming port of the packet. Certain fields can flows to the m flowsets such that they can be routed different- be wildcarded (i.e., unspecified) to aggregate flows into ly from common flows. This is achieved by setting the fields of flowset. The controller can also query the switches for an the TCAM dataword equal to the 12 tuples. All common update of flowset statistics. When there is no packet matching flows are mapped to one of the n flowsets, which are con- an entry for a certain period, the entry automatically gets structed by wildcarding certain fields of the TCAM dataword. deleted and a flow-expire message containing statistics of the In OpenFlow, TCAM entries with exact matches always take expired entry will be sent to the controller. The statistics col- the highest priority; the m important flows will not be for- lected from flowquery and flow-expire messages can be direct- warded by any of the n flowset rules. ly used by the controller to control flowset routing. We now discuss how each of the challenges enumerated Flowset Routing earlier is addressed in our prototype solution. In our proof-of-concept DMR implementation, we investigate one simple heuristic solution for the flowset routing problem. Learning Flow Importance It is an extension of 1/R routing [11]. In 1/R routing, link For many applications, flow importance is estimated by the size weights are assigned to be the reciprocal of residual link of flows. Example applications include detection of elephant bandwidth, and then the shortest paths are computed for all flows and traffic churns, and estimation of flow size distribution node pairs. In OpenFlow, the controller can periodically [9]. In OpenFlow, collecting flow sizes is easy if we have an query each link’s utilization. We assume 1/R routing to be the unconstrained number of flow table entries, since one flow default case, which is reasonable if the operator intends to table entry corresponds to a single flow. The controller can distribute the traffic evenly across the network. The paths cal- retrieve the byte/packet counts for each flow using flow- culated in this way are referred to as 1/R paths. We devise query/flow-expire messages in the OpenFlow protocol. Howev- concatenated 1/R routing (CR) to route important flowsets, as er, in practice, multiple flows are grouped into a flowset, and explained in the following. The definition of “important” is the flowset corresponds to a single flow table entry. Conse- specific to different measurement applications. quently, byte/packet counts are aggregated over many flows. To CR is designed for the case where there is only one monitor in overcome this, our prototype periodically disaggregates a small the network. It chooses the path with the smaller cost (in terms of portion of flowset entries into entries of individual flows, based sum of link weights) from the following two candidate paths. The on flowset statistics. It then maintains/queries individual flow first candidate path is a concatenation of a subpath from the src statistics for a certain period to estimate their importance. The switch to the monitor, and the other is a subpath from the moni- procedure is repeated such that every flow gets its importance tor to the dst switch. Both subpaths are calculated by 1/R routing, estimated. In DMR, the estimated important flows will be rout- and loops are avoided by iteratively excluding already selected ed to more complicated monitors for better measurement. It switches. The second candidate path is constructed in a similar tolerates estimation errors in assessing flow importance. manner, with a reversed order of calculating the two subpaths. In the case where there are multiple monitors, we propose Flowset Configuration another heuristic solution called weighted 1/R routing (WR). As mentioned earlier, flow table rules can be exactly specified WR assigns link weight as the reciprocal of a monitor weight by the 12-tuples or wildcarded to aggregate flows into flowsets. multiplied by residual link bandwidth. The monitor weight is The rules are described using datawords in a TCAM. In order large for links attached to the monitor and small for all other to map a set of flows into the same flow-table entry, we links. The smaller link weight for the links attached to the mon- require that a TCAM dataword be wildcarded on certain itor will attract traffic toward it. These modified link weights tuples. TCAMs allow all or a subset of the bits in the data are used to compute the shortest path for important flowsets. search word to have a “don’t care” state (i.e., any value for Our initial results show the the performance of CR and WR that bit will count as a match). This allows a single TCAM are comparable for a single-monitor case. For simplicity and dataword to possibly match multiple flows. The current Open- illustration purposes, we only present CR in our evaluation. Flow release imposes restrictions on how the “don’t care” bits In DMR, flowsets might get rerouted once their impor- are set. All the fields except mac and ip addresses may be tance and network conditions are dynamically updated. There- constrained to have either all their bits specified as “don’t fore, we consider the following two variations for CR: care” or none at all. The mac and ip fields can specify a post- • R, reroute existing flowsets if their importance changes. fix of its bit string to be “don’t care.” These constraints • NR, do not reroute existing flowsets even if some of them restrict the flexibility to configure flowsets, but must be become important, but only route a new flowset in a moni- adhered to while deploying a practical solution. tor-aware manner. Furthermore, our enterprise networks has flat layer 2 In order to avoid congestion, we amortize the redirection addressing as opposed to hierarchical layer 3 addressing. This tasks over time. In our experiment, we find that there is no limits our ability to aggregate flows that are destined for a need to explicitly reroute unimportant flows for load balanc- common egress switch. In order to solve this problem, we ing. Amortizing redirection tasks is sufficient. leverage on the solution in [10], which proposes to use a hier- To summarize, our DMR prototype implemented in Open- archical pseudo medium access control (PMAC) address to Flow conducts the following procedures: encode a host’s position in the topology. All hosts behind a • It iteratively splits flowset entries into small entries for indi- switch will have the same prefix in their assigned PMAC vidual flows. It learns, estimates, and updates the impor- addresses. The hosts remain oblivious to the assigned PMAC tance of flows by querying switches or utilizing flow-expire addresses, with their associated switches performing the messages. Important flows are routed using a separate flow appropriate PMAC to MAC header rewriting. The solution table entry while the rest are aggregated. allows OpenFlow to group together flows destined to the • It routes new flows as they arrive based on known flow/ same egress switch into the same flowset. flowset information. This includes deciding whether/how to As mentioned earlier, there is a budgeted number (b = m group the flow into a flowset and how to route the flowset. + n) of flowsets (TCAM entries per switch) for each OD pair. It reroutes/reconfigures existing flowsets based on dynamic We allocate n of these flowsets for default routing and learn traffic conditions. IEEE Network • May/June 2011 31
  • 4. Internet Gateway topology is typical for a tree-like enterprise network where DPI box the central gateway is at the top layer. We assume there is only one DPI box (monitor) in the network. We use packet Core layer level traces from the Lawrence Berkeley National Laboratory campus network [12]. We replay one trace to each switch with moderate rate (around 60 packets/s from each switch) to imi- Distribution tate a real OpenFlow-enabled campus network. The small layer rate is due to current limitations on the number of entries (around 1500) per OpenFlow switch. Our prototype can sup- port larger data rates with an increased entry number sup- ported by the switch. We also scale link bandwidth such that the maximum link utilization (MLU) is around 20 percent. In our experiment, we estimate iceberg identities on the fly Access layer based on most recent measurement; for example, an nw_dst is suspected to be an iceberg if its size is larger than μ fraction of Figure 2. Experiment topology. current traffic volume. We vary iceberg threshold from μ = 1 percent → 5 percent. Once a flow or flowset is estimated to be important (i.e., part of an iceberg in this case), we apply DMR DMR Case Study: Capturing Global to route it toward the DPI box. We describe the various Icebergs flowset configuration and routing scenarios in the next section. Besides Δβ, we are also interested in the following cost metrics: To showcase the effectiveness of our OpenFlow-based DMR • ΔMLU: We consider maximum link utilization (MLU) as our prototype, we consider one driving measurement application: traffic engineering (TE) metric and define ΔMLU as MLUDMR global iceberg detection and capture. A global iceberg is defined – MLU default ; that is, the difference between MLU when to be an “item” whose aggregated count value is above a cer- DMR is deployed and MLU when default routing is used. tain threshold. In this article, we define the “item” to be all • κ: The number of rule changes needed to perform rerouting. flows destined to the same nw_dst (IP destination address), • L: Average hop count for all the flows. that is, an nw_dst that attracts a lot of traffic (larger than μ Other performance metrics include average packet delay fraction of total amount) from distributed hosts. Such icebergs and throughput. In OpenFlow, it takes around 10 ms to create are of interest for different network management tasks, such a flow table entry per flow. Such delay is trivial because only as detecting a distributed denial of service attack or identify- the first packet will trigger the entry write. Since there is no ing botnet command and control traffic. Detailed security packet loss, the packet delay is closely related to L, and the analysis (e.g., DPI) allows postmortem analysis of events seen overall throughput stays the same. in the network and payload properties of the iceberg traffic in order to determine its potential source. However, capturing Experiment Scenarios payload is often an expensive process that requires dedicated Since we rely on OpenFlow counters (associated with flowset hardware or vast storage capacity for captured traces. As a entries) to estimate the size of flowsets, the choice of flowset result, operators can rarely afford to deploy DPI agents at configuration has an impact on how well DMR assesses the every single node. Instead, a handful of DPI boxes are placed importance of flows. To benchmark the performance of at strategic locations with limited storage resources. Hence, it DMR, we consider the following three experiment scenarios. is desirable to route flows destined to iceberg nw_dst across (Case 1) Flow routing: In flow routing, each entry in an these DPI boxes installed at selected locations. OpenFlow switch is defined for an exact match of 12 tuples; In our case study, we deploy DMR to learn the existence of that is, each flow has its own flow table (flowset) entry regard- a global iceberg and reroute the flows belonging to the iceberg less of its importance. Each flow has its estimated utility I* x toward the DPI box. To assess the quality of the traces captured calculated in the same way as I x , based on current size of for subsequent DPI, we define flow utility Ix to be the propor- nw_dst and traffic volume. Based on I*, CR directly forwards x tion of the size of its nw_dst and μ of total traffic amount if the estimated iceberg flows to the DPI box. Flow routing is the nw_dst is the iceberg; otherwise, it is 0. Ix is calculated offline finest granularity for flowset configuration, thereby providing to present the ground truth. We use b to denote the measure- the prototype with greatest control and highest expectation of ment utility gained by capturing iceberg flows, monitoring improvement. The downside of this approach is that it requires a large number of flow table entries, and β = ∑ I xε * , x hence may not be feasible in practice. x (Case 2) Static flowset routing: In this approach, flows are where ε* is the packet number for flow x that is forwarded to x grouped into flowsets by wildcarding certain fixed tuples. In the DPI box. We define the measurement improvement as a our setting, the flow table entries are matched to 6 tuples: ratio, Δ β = (β DMR – β default)/β default, where β DMR is the mea- dl_type, dl_vlan, dl_src, dl_dst, in port and the wildcarded surement utility gained with DMR, and β default is the utility nw_dst. We ignore following fields of the 6 tuples: nw_proto, achieved by default routing. nw_src, tp_src, tp_dst, nw_tos, dl_vlan_pcp. We assign the same PMAC [8] dl_src/dl_dst address to all the flows initiated Testbed Setup and Performance Metrics from/to the same switch. We do not ignore nw_dst since it is The current release of OpenFlow is more suitable for han- used to define an iceberg. However, we wildcard the last 26 dling enterprise network due to its limited number of TCAM bits of it to save entry numbers. In reality, dl_dst itself is suffi- entries (around 2000) used to create the flow table. To test cient to forward packets to the destination switch. However, DMR on OpenFlow, we would ideally have complete layer 2 such high-level aggregation prevents us from learning more topologies of enterprises and traces on every link. Unfortu- detailed flow information. Our wildcarding saves 66 percent of nately, such information is not accessible due to privacy con- entries compared to flow routing. Due to aggregation, individ- cerns. Instead, we build a topology as shown in Fig. 2. The ual flow sizes are no longer visible. Since the OpenFlow 32 IEEE Network • May/June 2011
  • 5. 0.6 counter is associated with flowset entries, the estimated size is for aggregated flows that share the same entry. 0.5 Δβ: Measurement improvement To calculate flowset utility we define nw_dst* to be the wildcarded nw_dst. There are therefore 64 (2 32–26) distinct 0.4 nw_dst*. A flowset is important if its nw_dst* is among the most popular (i.e., its size is larger than μ* of total count). 0.3 Similar to I*, we calculate the estimated utility for nw_dst* x and perform CR accordingly. 0.2 Note that there is a mismatch between μ* and μ since μ* is defined for wildcarded flowsets; that is, because an nw_dst is 0.1 important does not necessarily mean its nw_dst* is also big. It is therefore difficult to decide a proper μ*. We test the per- 0 formance on different μ*, but only present results for μ* = 5 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 μ percent and μ = 1 percent → 5 percent earlier. (Case 3) Dynamic flowset routing: Here, flows are grouped 0.012 into flowsets in the same way as in static flowset routing, except that the module now periodically splits some of the 0.1 flowset entries to query statistics of individual flows (as described earlier). The sizes of individual nw_dst then become ΔMLU: MLU increase visible. A flow will be routed separately once it is estimated to 0.008 be an iceberg (hence important), while common flows can be aggregated again to share one wildcarded entry and perform 0.006 1/R routing. Note that we only need to split the flowset at one switch to learn flow sizes, and keep the same flowset configu- 0.004 rations at other switches. Dynamic flowset routing maintains three separate identities: 0.002 OF (ordinary flowsets), CF (candidate flowsets), and IF (impor- tant flows). CF are the flowsets that divide their entries at one switch to learn individual flow sizes. For each period (20 s in our 0 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 experiment), the module performs three tasks. First, it reclassi- μ fies some flows from CF to IF if the rate of nw_dst for the flow is larger than μ of overall traffic rate. Second, it moves the remaining CF back into OF. Common flows of previous CF will 2.5 again be aggregated by wildcarded flowsets. Lastly, it selects some nw_dst* and their corresponding OF into CF. In our pro- 2 gram we pick one random nw_dst* and the largest (more than L: Average hop count μ* of traffic amount) nw_dst*s, and partition their correspond- ing flowsets into CF. It then splits CF’s entries to access individ- 1.5 ual flow importance. Every wildcarded flowset uses 1/R routing, while important flows are routed toward the DPI box with CR. 1 Evaluation Results 0.5 Flow routing We now present evaluation results for the three scenarios Static flowset-routing using CR routing with NR and R variations. Dynamic flowset-routing 0 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 Advantage of Dynamic Flowset Configuration — We first com- μ pare the performance of dynamic flowset routing against flow routing and static flowset routing in Fig. 3, using the CR/NR Figure 3. Advantage of dynamic FlowSet-Routing. routing algorithm. Since NR derivation does not redirect traf- fic, κ remains 0 for all three cases, and the graph is omitted. We generally see large measurement improvement (from 25 to nearly 80 percent), while the increase of σ is very small by around 0.006 ms/packet for dynamic flowset routing com- (from 0.025 to 0). We make the following four observations. pared to static flowset routing. First, flow routing achieves the most measurement gain. This Compared to flow routing, the greatest benefit of dynamic is because it utilizes the finest granularity in querying counter flowset routing is the small number of table entries. Com- statistics and routing. Second, the measurement improvement pared to static flowset routing, the measurement improvement for static flowset routing is less than flow routing or dynamic of dynamic flowset routing is higher. Dynamic flowset routing flowset routing. In static flowset routing, some iceberg flows demonstrates the most common practice of DMR in traffic do not belong to the important flowset defined based on μ* measurement where no prior iceberg identity of accurate ini- and thus are not routed through the DPI box. Third, due to tial measurements of flow sizes are available. It achieves a the tree-like topology, all three cases achieve very close L nice trade-off between measurement improvement and the (average hop count). Finally, the maximum entry number for number of flowset table entries. flow routing is around 700 over time. This number is reduced to around 200 for static flowset routing, but increases to Advantage of Rerouting — We next present the advantage of around 300 for dynamic flowset routing. The increased entry rerouting traffic by the CR/R routing algorithm in Fig. 4. Since number reflects larger average delay since it takes longer to L changes little, we omit its graph and present results for κ. set up entries. In our settings, the average delay is increased Compared to CR/NR, the measurement improvement is IEEE Network • May/June 2011 33
  • 6. Δβ: Measurement improvement 0.8 Concluding Remarks In this article we propose dynamic measurement-aware rout- 0.6 ing for network-wide traffic measurement. It overcomes the varying nature of both traffic characteristics and measurement objectives by intelligently routing important traffic sub-popu- 0.4 lations to some preconfigured monitors. The whole procedure therefore involves initial assessment of flow importance, 0.2 flowset configuration, and flowset routing with considerations of overall network performances. We discuss the challenges of implementing DMR in practice, build a prototype solution on 0 OpenFlow for global iceberg detection and capture, and eval- 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 μ uate its performance using real traces. We evaluate three situations: flow routing, static flowset routing, and dynamic flowset routing. They vary from the case of finest granularity of routing control to the case of real prac- 0.02 tice that can be commonly implemented. We generally see large measurement gain of iceberg detection, while network ΔMLU: MLU increase performance is preserved at decent levels. Our future work 0.015 includes exploring other measurement applications on Open- Flow and implementing DMR on IP networks. 0.01 References [1] C. Estan et al., “Building a Better NetFlow,” Proc. ACM Sigcomm, Portland, OR, Sept. 2004. 0.005 [2] C. Estan and G. Varghese, “New Directions in Traffic Measurement and Accounting: Focusing on the Elephants, Ignoring the Mice,” ACM Trans. Comp. Sys., vol. 21, no. 3, Aug. 2003, pp. 270–313. [3] J. Mai et al. , “Is Sampled Data Sufficient for Anomaly Detection?,” Proc. 0 ACM SIGCOMM IMC, Rio de Janeiro, Brazil, Oct. 2006. 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 [4] L. Yuan, C.-N. Chuah, and P. Mohapatra, “ProgME: Towards Programmable μ Network Measurement,” Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007. [5] K. Suh et al., “Locating Network Monitors: Complexity, Heuristics and Cover- age,” Proc. IEEE INFOCOM, Miami, FL, Mar. 2005. Flow routing [6] S. Raza et al. , “Measurouting: A Framework for Routing Assisted Traffic 400 Static flowset-routing Monitoring,” Proc. IEEE INFOCOM, San Diego, CA, June 2010. Dynamic flowset-routing [7] The Open Flow Switch Consortium, http://www.openflowswitch.org, Aug. κ: Number of rule changes 2010. 300 [8] “Sampling and Filtering Techniques for IP Packet Selection,” Internet draft draft-ietf-psamp-sample-tech-11.txt, work in progress, July 2008. [9] A. Kumar et al., “Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution,” ACM Sigmetrics, New York, NY, June 2004. 200 [10] R. N. Mysore et al. , “Portland: A Scalable Fault- Tolerant Layer 2 Data Center Network Fabric,” Proc. ACM SIGCOMM, New York, NY, June 2009. [11] E.-S. Jung et al., “An Evaluation of In-Advance Bandwidth Scheduling Algo- rithms for Connection-Oriented Networks,” Proc. Int’l. Symp. Parallel Archi- 100 tectures, Algorithms, and Networks, 0:133-138, May 2008. [12] Lbnl enterprise trace repository, http://www.icir.org/enterprise-tracing/, Aug. 2010. 0 0 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 Biographies μ GUANYAO HUANG (gyhuang@ucdavis.edu) is a fourth year Ph.D. candidate in the Department of Electrical Computer Engineering, University of California, Figure 4. Advantage of rerouting traffic. Davis. His current research focuses on network measurement and anomaly detec- tion. He completed his undergraduate and postgraduate degree from the Univer- sity of Science and Technology, China. even higher (from 30 to nearly 100 percent), while the increase SAQIB RAZA (sraza@ucdavis.edu) received his B.S. degree in computer science of σ is still kept at low levels (from 0.03 to 0.005). We make from Lahore University of Management Sciences in 2004, and Ph.D. and M.S. degrees in computer science from the University of California, Davis in 2007 the following three observations. First, CR/R has better mea- and 2010, respectively. He is a software engineer at the Data Center Switching surement improvement than CR/NR. In CR/NR, consistent Technology Group in Cisco Systems, San Jose, California. iceberg flows will not be captured by the DPI box if it initially did not traverse it. Second, similar to Fig. 3, flow routing SRINI SEETHARAMAN (srini084@gmail.com) is a member of the Clean Slate Labo- ratory at Stanford University and a senior research scientist with Deutsche achieves the largest measurement improvement, while static Telekom R&D Lab, Los Altos, California. He holds a Ph.D. in computer science flowset routing is the worst. Finally, the number of required from Georgia Institute of Technology and a Master’s degree in computer science rule changes, κ, is larger in dynamic flowset routing than in from The Ohio State University. His research interests include networking archi- the others. This is because the estimation of iceberg identities tectures and protocols, overlay networks, traffic/network monitoring, and green technologies. is not as accurate as in flow routing. Some non-iceberg flows are also redirected to the DPI box. CHEN-NEE CHUAH (chuah@ucdavis.edu) is a professor in electrical and computer Results generally suggest that rerouting traffic is useful to engineering at the University of California, Davis. She received her B.S. from achieve a larger measurement gain, but at the cost of huge churns Rutgers University, and her M.S. and Ph.D. in electrical engineering and comput- er Sciences from the University of California, Berkeley. Her research interests lie in terms of number of changes in forwarding rules. Rerouting in the area of communications and computer networks, with emphasis on Internet does not necessarily introduce large σ, since the default 1/R rout- measurements, network management, cyber-security, online social networks, and ing can distribute load away from congested links. vehicular ad hoc networks. 34 IEEE Network • May/June 2011