Download Towards Wireless Overlay Network Architectures

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Net neutrality law wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Peering wikipedia , lookup

Lag wikipedia , lookup

Net bias wikipedia , lookup

Distributed firewall wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Enterprise Networks
under Stress
1
= 60% growth/year
Vern Paxson, ICIR, “Measuring Adversaries”
2
= 596% growth/year
“Background”
Radiation
-Dominates
traffic in many
of today’s
networks
Vern Paxson, ICIR, “Measuring Adversaries”
3
Some Observations
• Internet reasonably robust to point problems
like link and router failures (“fail stop”)
• Successfully operates under a wide range of
loading conditions and over diverse
technologies
• During 9/11/01, Internet worked well, under
heavy traffic conditions and with some major
facilities failures in Lower Manhattan
4
The Problem
• Networks awash in illegitimate traffic: port
scans, propagating worms, p2p file swapping
– Legitimate traffic starved for bandwidth
– Essential network services (e.g., DNS, NFS) compromised
• Needed: better network management of
services/applications to achieve good
performance and resilience even in the face of
network stress
– Self-aware network environment
– Observing and responding to traffic changes
– While sustaining the ability to control the network
5
From the Frontlines
• Berkeley Campus Network
– Unanticipated traffic surges render the network
unmanageable (and may cause routers to fail)
– Denial of service attacks, latest worm, or the newest file
sharing protocol largely indistinguishable
– In-band control channel is starved, making it difficult to
manage and recover the network
• Berkeley EECS Department Network (12/04)
– Suspected denial-of-service attack against DNS
– Poorly implemented/configured spam appliance adds to DNS
overload
– Traffic surges render it impossible to access Web or mount
file systems
• Network problems contribute to brittleness of
distributed systems
6
Why and How
Networks Fail
• Complex phenomenology of failure
• Traffic surges break enterprise networks
• “Unexpected” traffic as deadly as high net utilization
– Cisco Express Forwarding: random IP addresses --> flood route
cache --> force traffic thru slow path --> high CPU utilization -->
dropped router table updates
– Route Summarization: powerful misconfigured peer overwhelms
weaker peer with too many router table entries
– SNMP DoS attack: overwhelm SNMP ports on routers
– DNS attack: response-response loops in DNS queries generate
traffic overload
7
Technology
Trends
Load Balancing
Traffic Shaping
• Integration of servers, storage, switching, and routing
– Blade Servers, Stateful Routers,
Inspection-and-Action Boxes (iBoxes)
• Packet flow manipulations at L4-L7
– Inspection/segregation/accounting of traffic
– Packet marking/annotating
• Building blocks for network protection
– Pervasive observation and statistics collection
– Analysis, model extraction, statistical correlation and causality testing
– Actions for load balancing and traffic shaping
8
Scenario: Traffic Surge
Inhibiting Network Services
II
Primary &
Secondary
DNS
Servers
R
Distribution
Tier
S
S
Mail
Server
Spam
Appliance
Internet
Edge
S
S
E
IS
R
Server
Edge
R
IA
Access
Edge
E
E
E
• DNS Server swamped by excessive request traffic
– Observe: DNS time outs, Web access traffic slowed, but also
higher than normal mail delivery latency implying busy server edge
(correlation between Mail Server and DNS Server utilization?)
– Root Cause: High DNS request rates generated by Spam Appliance
triggered by mail surge
9
Scenario Continued
II
Primary &
Secondary
DNS
Servers
R
Distribution
Tier
S
S
Mail
Server
Spam
Appliance
Internet
Edge
S
S
E
IS
R
Server
Edge
R
IA
Access
Edge
E
E
E
• How Diagnosed?
– I-S detects high link utilization but abnormally high DNS traffic
– Stats from I-I: high mail traffic, low outgoing web traffic, in
traffic high but link utilization not high
– Stats from I-A: lower web traffic, no unusual mail origination
– Problem localized to Server edge, but visibility limited
10
Scenario Continued
II
Primary &
Secondary
DNS
Servers
R
Distribution
Tier
S
S
Mail
Server
Spam
Appliance
Internet
Edge
S
S
E
IS
R
Server
Edge
R
IA
Access
Edge
E
E
E
• Possible Action Responses
– Experiment: Redirect local DNS requests to Secondary DNS server:
if these complete, can infer the server is the problem, not the
network
– Throttle: Due to MS-DNS correlation, block/slow email traffic at
Server Edge: should expect reduced DNS server utilization
11
Internet
Edge
Scenario
Access
Edge
Distribution
Tier
PC
MS
Spam
Filter
FS
DNS
Server Edge
12
Observed
Operational Problems
• User visible services:
– NFS mount operations time out
– Web access also fails intermittently due to time outs
• Failure causes:
–
–
–
–
Independent or correlated failures?
Problem in access, server, or Internet edge?
File server failure?
Internet denial of service attack?
13
Network Dashboard
b/w
consumed
Gentle rise
in ingress
b/w
Unusual
step jump/
DNS xact
rates
DNS CPU
utilization
time
FS CPU
utilization
time
No unusual
pattern
Access
Edge b/w
consumed
Decline
in access
edge b/w
time
MS CPU
utilization
time
Mail traffic
growing
time
In
Web
Email
Out
Web
14
Network Dashboard
b/w
consumed
Gentle rise
in ingress
b/w
Unusual
step jump/
DNS xact
rates
DNS CPU
utilization
CERT Advisory!
DNS Attack!
time
FS CPU
utilization
No unusual
pattern
time
Access
Edge b/w
consumed
Decline
in access
edge b/w
time
MS CPU
utilization
time
Mail traffic
growing
time
In
Web
Email
Out
Web
15
Observed Correlations
• Mail traffic up
• MS CPU utilization up
Causality no
surprise!
– Service time up, service load up,
service queue longer, latency longer
• DNS CPU utilization up
– Service time up, request rate up,
latency up
• Access edge b/w down
How does
mail traffic
cause DNS
load?
16
Run Experiment
Shape Mail Traffic
MS CPU
utilization
Mail traffic
limited
In
Web
Out
Web
time
DNS CPU
utilization
DNS
down
time
Access
Edge b/w
consumed
Access
edge b/w
returns
time
Email
Root cause:
 Spam appliance --> DNS lookups
to verify sender domains;
 Spam attack hammers internal
DNS, degrading other services:
NFS, Web
17
Policies and Actions
Restore the Network
• Shape mail traffic
– Mail delay acceptable to users?
– Can’t do this forever unless mail is filtered at the
Internet edge
• Load balance DNS services
– Increase resources faster than incoming mail rate
– Actually done: dedicated DNS server for Spam appliance
• Other actions? Traffic priority, QoS knobs
18
Analysis
• Root causes difficult to diagnose
– Transitive and hidden causes
• Key is pervasive observation
– iBoxes provide the needed infrastructure
– Observations to identify correlations
– Perform active experiments to “suggest” causality
19
Many Challenges
• Policy specification: how to express? Service Level
Objectives?
• Experimental plan
– Distributed vs. centralized development
– Controlling the experiments … when the network is stressed
– Sequencing matters, to reveal “hidden” causes
• Active experiments
– Making things worse before they get better
– Stability, convergence issues
• Actions
– Beyond shaping of classified flows, load balancing, server scaling?
20
Implications for Network
Operations and Management
• Processing-in-the-Network is real
• Enables pervasive monitoring and actions
• Statistical models to discover correlations and
to detect anomalies
• Automated experiments to reveal causality
• Policies drive actions to reduce network stress
21
Datacenter Networks
22
22
Networks Under Stress
23