Document 7826982

Download Report

Transcript Document 7826982

Measurement and Monitoring

Nick Feamster Georgia Tech

Measurement and Monitoring

Measurement: “Inventory” of network state

– Traffic loads on links – End-to-end packet loss rates, throughput, etc.

– … •

Monitoring: Use of measurement to detect events of (operational) interest

– Link failures – Stolen routes (“hijacks”) – …

Problem Areas

• Traffic Engineering • (Distributed) Network Troubleshooting • Anomaly Detection

Good work in pieces of each puzzle.

Lots of heuristics.

Nothing that unifies these pieces yet.

Traffic Engineering

Problem: Tune routing protocol parameters to control traffic flow through the network.

Internal routing (IGP): routes to nodes within the network (“AS”) BGP: routes to external destinations

Traffic Engineering

• •

Goal: Efficient, offline analysis Lots of measured inputs Routes to external destinations OSPF Link Weight Optimization Topology Static configuration analysis BGP configuration Traffic matrix estimation

Routing Model for Network

Offered traffic

Traffic Flow

TE-Motivated Algorithmic Problem

• How to identify large traffic bundles?

Today’s mode:

By address block (actually, groups of prefixes, by AS path regular expressions) –

Clunky!

Wanted:

traffic bundle identification – “To move 10 Mbps from the Sprint peering point in New York to the AT&T peering point in Boston, do

X

.” –

X

may depend on timescales of traffic engineering issue (flash crowd, persistent congestion, etc.)

What to do once we’ve measured?

• IGP link weights and BGP parameters both: – Change the traffic volumes on internal links – Change traffic volumes on links between ASes •

Questions

– How to explore the parameter search space?

– How to decide when to tweak IGP or BGP? •

Probable Answer: Intractable

Design for optimization:

Could the routing protocol “knobs” be designed so that joint optimization is easier?

Network Troubleshooting

Goal:

Locate and diagnose network performance (or reachability) problems •

Status:

Lots of (somewhat imperfect) tools – Ping: “reachability” – Traceroute: “IP-layer path to destination” – Iperf: throughput – Pathchar: per-hop capacity estimation • None of these is

prescriptive.

They often don’t answer questions that would lead to a solution.

– “Why is the traffic not getting there?” (link failure, firewall configuration, etc.) – “Which network caused this event?”

Why Troubleshooting is Hard

Plethora of causes

• Misconfigured filters • Link failures (between ASes or within an AS) • Middlebox problem (NAT, firewall, etc.) • Application-level failures (server crash) • Service failure (DNS failure)

Key (currently hard) questions

• Is the problem local or global? • If global, where is it?

Perhaps asking neighboring networks can help

Distributed Network Troubleshooting

How can views of the network from other vantage points assist in locating and diagnosing problems?

“Yes, and my path is…” Yale “No…” Princeton Georgia Tech “Can you see cnn.com?” cnn.com

Some Measurement Problems

• Could protocols be augmented/altered to make them more amenable to passive measurement?

– What are the accuracy bounds for passive measurement algorithms (

e.g.

, sampled NetFlow) • How many views are needed to locate a problem?

– Perhaps this depends on the problem…things like filtering/reachability might be easier than congestion – The answer may also change depending on the topology and failure model (

i.e.,

what if some nodes can’t talk to each other?

Measurement and Monitoring

Measurement: “Inventory” of network state

– Traffic loads on links – End-to-end packet loss rates, throughput, etc.

– … •

Monitoring: Use of measurement to detect events of (operational) interest

– Link failures – Route hijacks – …

Anomaly Detection

State of the art: Threshold-based schemes

– Counting the number of BGP updates – Counting the number of failed TCP connections – Measuring the size of a traffic shift •

Problem:

Many events of interest are

small

– Route hijacks: one BGP update (small amount of traffic) – Polymorphic worms:

e.g.,

2-byte common substring

Detecting Small Events

• What techniques can tease out (low-energy) signal from noise?

Route hijacks:

Could exploting correlations

across

data streams expose deviations? Need distributed algorithms for tracking patterns in real time… –

Worm containment:

Algorithms for fast (line rate) detection of small common substrings?

• What changes might (1) raise the bar for these attacks or (2) facilitate distributed anomaly detection?

e.g.,

having a better notion of identity than an IP address

Real Problem

• State of the art distributed debugging protocols…