EP1611527A1 - Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises - Google Patents

Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises

Info

Publication number
EP1611527A1
EP1611527A1 EP04749822A EP04749822A EP1611527A1 EP 1611527 A1 EP1611527 A1 EP 1611527A1 EP 04749822 A EP04749822 A EP 04749822A EP 04749822 A EP04749822 A EP 04749822A EP 1611527 A1 EP1611527 A1 EP 1611527A1
Authority
EP
European Patent Office
Prior art keywords
network
data set
network node
network management
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP04749822A
Other languages
German (de)
English (en)
Inventor
Koom-Seng Lim
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Synematics Inc
Original Assignee
Synematics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Synematics Inc filed Critical Synematics Inc
Publication of EP1611527A1 publication Critical patent/EP1611527A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/163Interprocessor communication
    • G06F15/173Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star, snowflake
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/407Bus networks with decentralised control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/427Loop networks with decentralised control

Definitions

  • the present invention relates to a system, method and software arrangement for providing distributed network management and, more particularly to a system, method and software arrangement for providing pattern-based distributed network management wherein lightweight mobile agents are distributed throughout a network based upon a pre-defined pattern to perform network management functions.
  • IP internet protocol
  • software routers In order to apply some of the techniques used in high-performance active network platforms to the management of traditional internet protocol (“IP”) networks, software routers have been used. In these environments, the operating system intercepts packets for processing in a management execution environment, usually through an IP option called Router Alert. Many of the systems developed , along this line emphasize flexibility over performance and generally require the support of a heavyweight infrastructure, such as those built on Java.
  • Mobile agents can be characterized as self-contained programs that move tlirough the network and act on behalf of a user (i.e., a human operator) or another entity.
  • Mobile agents are generally complex, since they often need a degree of intelligent behavior for autonomous decision-making.
  • the mobile agents execute various network management tasks in a distributed manner.
  • a major drawback of the mobile agents approach to distributed network management lies in the structure of the mobile agents themselves. The mobile agents are fairly complex, requiring more processing power than is typically present in standard routers or switches and require significant bandwidth in order to propagate throughout the network.
  • FIGs. 1 A - ID represent the simplest examples of navigation patterns.
  • a basic pattern 100 is illustrated in Fig. IA, where control moves (represented by arrow 106) from one node 102 to another node 104 and returns (represented by arrow 108) after triggering an operation in the node 104.
  • a manager-agent interaction is an example of this pattern.
  • Another pattern 120 represents the scenario where control begins at an originator node 122 moves along a number of nodes 124 in a path in the network, triggers operations on the nodes 124 of this path, and returns to the originator node 122 along the same path.
  • a possible application of this pattern is resource reservation for a virtual path or a multi-protocol label switching ("MPLS") tunnel.
  • MPLS multi-protocol label switching
  • Still another pattern 140 is illustrated in Fig.
  • control begins at an originator node 142 migrates to a node 144, then in parallel to neighboring nodes 146, 148, triggers operations on these nodes, and returns with result variables to the originator node 142.
  • the pattern 140 can be understood as a parallel version of the pattern 100.
  • control moves along a circular path in the network. It is important to note that navigation patterns can be defined independently of the management tasks performed in an operation. A drawback of these propagation schemes is their non-determinative nature.
  • the exemplary apparatus is an network node including a router connected to at least one other network node of a plurality of network nodes and a processor.
  • the processor is configured to receive a network management program and mobile state information, determine whether to send the network management program to the at least one other network node of the plurality of network nodes, transmit the mobile state information to the at least one other network node of the plurality of network nodes, and selectively transmit the network management program based upon the determination to the at least one other network node of the plurality of network nodes.
  • Figs. 1 A - ID show examples of prior art network navigation patterns
  • Fig. 2 illustrates an exemplary embodiment of a pattern-based network management system according to the present invention
  • Fig. 3 illustrates an exemplary embodiment of an Echo pattern of network management program dissemination according to the present invention
  • Fig. 4 illustrates an exemplary embodiment of a software architecture of an active node of the pattern-based network management system according to the present invention
  • Figs. 5 A - 5D shows an exemplary embodiment of a process for distributing a new network management program throughout the pattern-based network management system of Fig. 2 according to the present invention
  • Fig. 6 illustrates an exemplary embodiment of a process for distributing a new network management program from active node to active node throughout the pattern-based network management system of Fig. 2 according to the present invention
  • Fig. 7 shows a graph comparing the scalability of the pattern-based network management system against a centralized network management system.
  • a pattern-based network management system 200 for managing a network in a decentralized manner using a pattern-based paradigm.
  • the system 200 realizes a pattern-based network management paradigm using a network of low-cost, single- board computers that are attached to commercial off-the-shelf routers, referred to as commodity routers.
  • This system 200 utilizes the coordinated actions of lightweight mobile agents that can be deployed on existing networks. These lightweight mobile agents execute network management operations in a fast and scalable manner.
  • the lightweight mobile agents exploit the parallel processing capability of the network. These agents always carry state information with them, but carry a network management program only when absolutely necessary, rendering the lightweight mobile agents quite small when transmitted from node to node in the network.
  • the lightweight mobile agents are configured to be distributed on a network of commodity routers and are designed such that no modifications to the routers are required.
  • the lightweight mobile agents manage the network in a distributed manner using pattern-based management.
  • Pattern-based management centers around the concept of the navigation pattern, used for controlling and coordinating the actions of the lightweight mobile agents.
  • Navigation patterns realize graph traversal algorithms that determine the dissemination of local management operations throughout the network and the aggregation of the results of these local operations.
  • the system 200 utilizes an efficient implementation of a pattern-based management system, whereby the network management programs disseminated by the lightweight mobile agents complete execution quickly, even in large networks. Also, the network management programs are designed to execute on virtually all commodity routers.
  • Pattern-based management systems have several advantages over other network management approaches.
  • First, management programs can be formally analyzed with respect to performance and scalability. This analysis is based on the analysis of the graph traversal algorithm and its underlying pattern.
  • Second, navigation patterns allow the separation of the semantics of management operation and the distributed programming aspects of the operation. From a software engineering perspective, this separation allows application and/or network developers to design generic patterns that can be combined with specific semantics to implement a particular management operation in a straight forward manner.
  • a pattern, once designed can be reused in the implementation of many management tasks.
  • a specific management task can potentially be built from a choice of patterns, which enables application and/or network developers to build management operations with different performance profiles.
  • this approach frees an application programmer from developing distribution algorithms, allowing him/her to focus on the management task at hand, by selecting a navigation pattern from a catalogue that captures the requirements for that task.
  • the response to network faults which can be complex to understand and handle, can be programmed into a pattern, thereby eliminating the need for the application programmer to deal with faults.
  • the degree of code mobility can be controlled in a fine-grained manner, since the execution of a management operation in a network involves distributing only those parts of the program which are not already resident in the network nodes. In other words, for a management program that is frequently executed, only the states of the distributed computation need to be exchanged between network nodes, not the code, which is locally available.
  • Various management operations can be realized in the system 200 through the network management programs of the lightweight agents.
  • the lightweight agents are distributed throughout the system 200 based on an Echo pattern 300 (shown in Fig. 3). These various management operations are useful in managing a network having a very large number of nodes, a dynamic topology and no centralized topology database. All management computations are performed on logical network nodes, i.e., inside the network.
  • the management operations include statistical abstractions of the topology, statistical abstractions of local performance data, correlation of performance data with topological data, and software configuration management.
  • Statistical abstractions of the topology allows the network management station 202 to discover various data about the network including: the current local network topology about a given node, the number of leaf nodes in the network topology, the diameter of the network, the connectivity distribution of the network topology, and the like.
  • Statistical abstractions of local performance data allows the network management station 202 to determine the most congested links in the network, and/or the distribution of the link load, queue lengths, and the like in the network.
  • Correlation of performance data with topological data allows the network management station 202 to identify sub-topologies where all links are highly loaded, compute the routes and the traffic volume that flows between two sub-regions of the network within a certain time period, and the like.
  • Software configuration management allows the network management station 202 to install a software patch on all routers running a particular version of an operating system.
  • a concern relating to the network management system 200 is code mobility. Specifically, determining whether code should be transferred from logical network node to logical network node in its binary or source code form, and whether code is to be transported by patterns or downloaded from code servers. The decisions made in addressing these questions have implications on the performance of the system 200 and its vulnerability to attacks.
  • the system 200 transfers the network management programs in binary form from logical network node to logical network node throughout the network using patterns.
  • code servers may be used disseminate the network management program. As the network becomes larger, however these code servers become bottlenecks. Increasing the number of code servers to overcome this issue introduces other problems, because keeping copies of the network management program on all code servers throughout the network up-to-date and consistent can be expensive and time consuming.
  • the system 200 transfers the network management program in its source code form. In another exemplary embodiment of the present invention, the system 200 transfers the network management program in its source code form to a first logical network node only, which compiles the network management program into its executable code form, which is then transmitted throughout the network.
  • the system 200 attempts to address this issue in several ways.
  • All communication between a network management station 202 and a logical network node occurs through an secure socket layer enabled (“SSL-enabled”) web interface. This reduces the risk of unauthorized access and protects against masquerade attacks.
  • SSL-enabled secure socket layer enabled
  • the compiled code or the executable of a management program is only executed within the context of a separate process with restricted rights and resource quotas. This prevents management programs from interfering with one another or from crashing the daemon, should a fatal error occur.
  • the communication channel between each of the logical network nodes 220, 230, 240 are implemented using a simple protocol, similar to transport layer security ("TLS") protocol or the like, thereby preventing a third party from altering the program code or state while the data is in transit.
  • TLS transport layer security
  • all services that come with the operating system running on the logical network nodes 220, 230, 240 and are not used by the system 200 are disabled.
  • Fig. 2 illustrates a network architecture of the pattern-based network management system 200 according to an exemplary embodiment of the present invention.
  • the system 200 includes the network management station 202, a code server 204 and a plurality of logical network nodes 220, 230, 240.
  • Each of the plurality of network nodes 220, 230, 240 include a physical router 208, 210, 214 in communication with an active node 206, 212, 216, respectively.
  • Copies of a pattern- based network management program run in the active nodes 206, 212, 216 of the network nodes 220, 230, 240.
  • the pattern-based management program can be realized in a number of ways, for example, using a general purpose framework, such as Java, or an active networking toolkit, such as ANTS, which is described in more detail by http://tns-www.lcs.mit.edu/publications/openarch98.html, incorporated herein in its entirety by reference.
  • Execution of the pattern-based network management program begins when a lightweight mobile agent containing the network management system is transmitted from the network management station 202 to the active node 206 of the first network node 220 (sometimes called the start node or originator node).
  • the program has completed its execution cycle on the first node 220, a pattern component of the program determines the appropriate subsequent node or nodes on which the program must execute next.
  • the lightweight mobile agent is transmitted containing only the program' s state information to the subsequent node. Otherwise, the lightweight mobile agent is sent containing the network management program in its executable form and mobile state variables.
  • Each router 208, 210, 214 is managed by a dedicated active node 206, 212, 216 that hosts the execution environment needed for running the pattern-based network management program.
  • Each active node 208, 210, 214 includes an internet- enabled, single-board computer including a network interface and a storage device.
  • the hardware of the active node 206, 212, 216 is commercially available in the form of an aluminum cube of 3 inches per side.
  • Each active node 206, 212, 216 runs a modified distribution of the Unix operating system having limited functionality.
  • the internet-enabled, single-board computer is equipped with an Intel StrongARM 1110 microprocessor, 32MB of SDRAM, and a 10Mbps Ethernet interface.
  • the storage device is a 1 GB drive connected to the onboard compact flash slot of the single-board computer, h a further exemplary embodiment, each of the active nodes 206, 212, 216 runs a Linux kernel, as well as, an Apache web server, which is used to implement the wide area network's management interface.
  • the active nodes 206, 212, 216 of the network nodes 220, 230, 240 may be included within the routers 208, 210, 214, respectively. Realizing such a system at low cost on commodity routers considerably restricts the design space and poses a significant challenge to network and/or application designers.
  • the network management station 202 executes the actions of the code server 204, thereby simplifying the hardware used in the system 200.
  • a pattern-based management system can eliminate bottlenecks associated with centralized processing of management data, by distributing load to network nodes via an appropriate navigation pattern.
  • an Echo pattern 300 shown in Fig. 3, as a way to distribute computation to network nodes, highly scalable management programs can be implemented in compact form.
  • the Echo pattern 300 is an extension of the basic pattern 140 and is particularly efficient at distributing and aggregating data over large networks.
  • the Echo pattern 300 is based on a class of distributed graph traversal algorithms known as wave algorithms.
  • the Echo pattern 300 represents an efficient and elegant scheme for enabling global management operations in complex and large networks.
  • the Echo pattern 300 dynamically adapts to changes in the network topology, does not require up to date network information, and scales well in very large networks.
  • the time complexity of the Echo pattern 300 increases linearly with the network diameter, which results in fast execution times in networks with a connectivity distribution that follows the power law.
  • the traffic complexity of the Echo pattern 300 grows linearly with the number of network edges, and the management traffic produced by executing this pattern is distributed evenly across all links, without causing hot spots, where congestion can occur.
  • the behavior of the Echo pattern 300 can be described as follows.
  • the pattern 300 starts out from an originator node 302, migrating to each of its neighbors 304, 306 for further execution during an expansion phase of the Echo pattern 300.
  • a lightweight mobile agent propagates (represented by arrows 312, 314, 316, 318) from one node to each neighbor node.
  • a lightweight mobile agent, arriving on a node for the first time marks the node as 'visited' (for example, node 304) and transmits a lightweight mobile agent to each neighbor (here nodes 308, 310), except for the one from which it arrived, which is called its parent (here node 302).
  • Fig. 4 illustrates a software architecture 400 of the active nodes 206, 212, 216 of the network management system 200.
  • the software architecture 400 of each of the active nodes 206, 212, 216 are essentially the same and for the sake of simplicity, the software architecture 400 will be described in terms of the active node 206.
  • the software architecture 400 includes an active node manager 402, a compiler 416, an active node engine 404 and a group of data repositories 414, 418, 420, 422, 424.
  • the active node manager 402 offers a web interface to the network management station 202 for configuring and operating the active node 206.
  • the active node engine 404 includes a preprocessor 406, an execution environment 408, a transport access point 410 and a device manager 412.
  • the active node engine 404 runs as a background process. It implements the execution environment 408, which runs the pattern-based network management program on the active node 206.
  • the node state repository 414 stores the operational state of the active node 206 including the numbers and parameters of executing management programs.
  • the source repository 416 stores source code associated with a number of programs.
  • the binaries repository 418 stores a cache of ready-to-run patterns and aggregators.
  • the local program state repository 422 stores local state variables when a lightweight mobile agent migrates to another node.
  • the management operation result repository 420 provides for persistent storage of results returned from a management operation.
  • the active node manager 402 includes an Apache SSL-enabled web server and a set of server-side scripts, such as hyper text preprecessor ("PHP") scripts.
  • PHP hyper text preprecessor
  • Figs. 5 A - 5D illustrate a process 500 for distributing a new network management program on the system 100.
  • the process 500 begins at step 502 when the active node manager 402 of the start node, here the active node 206, receives a lightweight mobile agent containing a network management program in its source code from the network management station 202.
  • the start node (sometimes referred to as the originator node) is simply the first active node to receive the new source code.
  • the active node manager 402 stores the new source code in the source repository 414 and relays the source file names and the parameters to the preprocessor 406 at step 504.
  • the preprocessor module 406 invokes the compiler 416 to process the source code of the new portion of the new network program and computes a digital fingerprint, such as, an MD5 checksum of the resulting binary, to verify the integrity of the data.
  • the compiler determines whether an error occurred during compilation. If the compiler 416 encountered an error while processing, the compilation is aborted and the process 500 advances to step 509. Otherwise, the process 500 advances to step 510 and the preprocessor 406 invokes the execution environment 408 to run the new network management program.
  • the process 500 dynamically loads the program and instantiates the pattern and aggregator objects.
  • the execution environment 408 returns an error code to the network management station 202 via the active node manager 402.
  • the process 500 determines whether program binaries are in the binary repository 418. If the program binaries are already in the binary repository 418, the preprocessor 406 invokes the execution environment 408 directly at step 516, passing to it the filenames and paths of the compiled binaries. Otherwise, the process 500 advances to step 517, where the execution environment 408 returns an error code to the network management stations 202 via the active node manager 402 and the process 500 exits.
  • the execution environment 408 dynamically loads the new network management program, the pattern object and the aggregator object and begins execution of the new network management program.
  • the execution environment 408 also generates a system- wide unique cookie at step 520, which associates the distributed state of the program with its current execution.
  • the execution environment 408 relinquishes control to the device manager 412 at step 520, passing the arguments as specified by the network management station 202 to the device manager 412 for further processing.
  • the network management program accesses the management interface of the attached router through the device manager 412 in order to acquire a list of active node addresses.
  • the device manager 412 implements low-level monitoring procedures, such as heartbeats, to detect failures in attached devices.
  • the active node 206 includes a single device manager 412 for a simple network management protocol ("SNMP") protocol.
  • SNMP simple network management protocol
  • the network management program When the network management program has completed its execution on the active node 206, it returns control and a list of active node addresses to the execution environment 408 at step 526.
  • the list of active node addresses are the active nodes the lightweight mobile agent will migrate to next.
  • the execution environment 408 concludes its active execution cycle.
  • the execution environment 408 stores the local program variables in the local state repository and serializes the mobile state variables. Once the mobile state variables are serialized, they are passed to the transport access point 410, along with the list of node addresses, a request to transmit data to those addresses and the cookie.
  • the main function of the transport access point 410 is to securely transfer program code and states between adjacent nodes. Whenever an active node is initialized, it connects to its neighboring active nodes by establishing secure channels. When a transport access point 410 receives a request to send a lightweight mobile agent to a list of active node addresses, the transport access point 410 determines whether any additional addresses exist in the list of active node addresses at step 530. If no additional addresses exist, the process 500 exits.
  • the transport access point 410 determines whether the active node indicated by the current address of the list of addresses has a copy of the current executable.
  • the transport access point 410 makes this determination by reading records of an executable transmission table.
  • Each record of the executable transmission table contains an active node address and the digital fingerprint, such as, an MD5 program checksum, for each executable sent or received by the transport access point 410. If no record exists wherein an active node address of a particular record matches the current address and the digital fingerprint of the particular record matches the digital fingerprint associated with the current executable, the executable is sent to the node associated with the current address, despite the chance that the neighbor might actually have a copy of the executable.
  • the process 500 advances to step 536 and the transfer access point 410 transmits the mobile state variables and the cookie to the active node at the current active node address. Otherwise at step 538, the transfer access point 410 transmits the mobile state variables, the cookie and the executable code to the active node at the current active node address.
  • the transfer access point 410 also updates its records reflecting the transmission of the executable having a particular digital fingerprint to the current address. hi order to distribute the new network management program throughout the system 100, various active nodes will send the new network management program in its executable form to other active nodes. Fig.
  • the process 600 begins when a lightweight mobile agent containing the executable is received by the transport access point 410 at step 602.
  • the transport access point 410 stores a record in the executable transmission table reflecting the active node address from which the lightweight mobile agent came and the digital fingerprint of the executable form of the new network management program.
  • the transport access point 410 stores the executable in the binary repository 418 at step 606.
  • the transport access point 410 invokes the execution environment 408 to run the new network management program.
  • the process 600 must determine whether the executable has run on the current active node. Using the system- wide cookie, the execution environment of the current active node determines whether the node has participated in the current execution of the program. When the program is first executed on a node, the system-wide cookie is stored on the node by the execution environment. If the program returns to the node at some later time, the execution environment can check to see if it has already stored the cookie. If the system-wide cookie associated with the program is already stored on the node, the node has already participated in the current execution of the program. Otherwise, it is the first time the node is executing the program. When the program completes its final execution on the node, its associated cookie is deleted by the execution environment.
  • step 614 the process 600 dynamically loads the executable and instantiates the pattern and aggregator objects.
  • the process 600 reads the local state variables of the new network program from the local program states repository 422.
  • the execution environment 408 dynamically loads the pattern and aggregator objects and executes the new network management program at step 616.
  • the process 600 passes control to the process 500 at step 522 for the remainder of its execution.
  • a discrete-event simulator was developed. The discrete-event simulator is capable of simulating a large pattern-based management system of up to 60,000 nodes. Pattern-based management programs are loaded into the simulator on the fly for simulation.
  • the simulator's interactive features allow the dynamics of a pattern to be visualized and recorded when its associated management program is executed. Performance data, such as completion time and volume of management traffic generated, can be collected and analyzed in order to determine the efficacy of management programs and improve thereon.
  • the discrete-event simulator is a C++ application executing on a personal computer running a Microsoft Windows operating system.
  • Execution time is defined as the time period from when a network management program is launched, i.e. downloaded for execution, on a start node to when the results are returned to the network management station 202.
  • Two series of experiments have been conducted to obtain a delay profile for the network management programs used on the system 200.
  • the first series of experiments focus on measuring the delay incurred by a management program based on the pattern 100 (shown in Fig. 1 A).
  • the pattern 100 essentially models a simple polling operation, where control passes from a node to its neighbor before returning.
  • the patterns 120, 140 can be expressed as serial compositions of patterns 100.
  • the pattern 130 is the basic building block of a class of patterns in which control is passed to neighboring nodes in parallel.
  • the measurements obtained from benchmarking the pattern 130 will allow estimation of the performance of management programs that are based on patterns derived from the pattern 130 (one of which is the Echo pattern 300).
  • the experiments have been carried out on an isolated test bed of four Cisco 2621 routers, which are interconnected via a Cisco Catalyst 2900 fast Ethernet switch. Each router is equipped with 2 fast Ethernet ports, one of which is connected directly to an access node 206.
  • a 1.13 GHz DELL Inspiron 8100 notebook serves as the network management station 202. Static routes have been setup from each router to the fast Ethernet switch, so that all nodes are able to communicate with each other.
  • the first phase begins when control is passed to the network management program (TI). This is called the execution phase.
  • the serialization phase T2 is invoked to serialize the program's mobile state variables into a buffer, which is then transmitted to the remote active node in the dispatch phase (T3).
  • the receiving phase T4) begins, when the mobile state variables have been received on the remote active node.
  • the network management program code if sent is also saved during this phase.
  • the next phase can be either the loading phase (T5) or the instantiation phase (T6).
  • the loading phase (T5) occurs the first time a new network management program is executed on an active node.
  • Typical tasks performed include invoking the dynamic linker to load the program code as a shared library and instantiating the pattern and aggregator objects. If the network management program has already been loaded, due to a previous execution, the instantiation phase (T6) is performed. During the instantiation phase the pattern and aggregator objects are instantiated. There is no need to invoke the dynamic linker during the instantiation phase (T6) as is required during the loading phase (T5)
  • the network management program If the network management program is still active on a node (meaning that the pattern is certain to traverse the node again after management information is collected by downstream nodes), the pattern and aggregator objects are not destroyed when the program migrates to another node. In such cases, the only task performed is a lookup to return their object references. This is called the resolving phase (T8). Finally the de-serialization phase (T7) recreates the mobile state variables in the program addresses space prior to execution. The network management program requires the mobile state variables to complete execution on a particular active node. Table 1. Overhead incurred b each hase of execution of the T e 1 attern
  • Table 1 gives the mean and standard deviation of the delay for each of the phases (TI through T8 and T c ), as measured over 40 runs.
  • the communication delay on the last row of the table includes transmission delay, propagation delay and operating system overhead.
  • the size of the mobile state variables communicated between active nodes is 207 bytes.
  • the pattern program contains the minimal code necessary to implement the pattern 100 and does not perform any other computations.
  • the aggregator program contains only empty functions.
  • the (average) completion time of a pattern 100 is derived as:
  • Tpattern 100 3T1 + 2(T2 + T3 + T4 + TJ) + T6 + T8 + T c
  • K.S. Lim et. al "Weaver: Realizing a Scalable Management Paradigm on Commodity Routers," KTH/IMIT/LCD Technical Report Nr. 02-5021, August 2002, incorporated herein by reference in its entirety.
  • an additional delay of T5 - T6 incurs, because the execution environment 408 needs to invoke the dynamic linker.
  • the estimate given by the above equation does not take into account the situation when the node daemon is swapped out by the operating system.
  • Table 2 compares the estimated completion time (based on the above formula and table 1) with the actual measurements on the test bed for all the basic patterns 100, 120, 130, 140. As can be seen, the estimations lie below the measured delays in all cases, with a margin of error between 8.3% and 10%. Table 2. Com arison of estimated vs. actual measurements for the four basic atterns
  • the completion times of a network management operation are measured and calculated.
  • the completion times of pattern- based management programs on large networks are estimated using a software program capable of simulating the execution of pattern programs and aggregators on a single computer, such as SIMPSON, which is described in more detail by K.S. Lim and R. Stadler, "Developing pattern-based management programs," Proceedings of IFIP/IEEE International Conference on Management of Multimedia Networks and Services (MMNS 2001), Chicago, IL, Oct. 29 2001, pp. 345-358, and encorporated herein in its entirety by reference, and the delay profiles shown above.
  • SIMPSON software program capable of simulating the execution of pattern programs and aggregators on a single computer
  • the time of the same operation executed on a centrally management network polling nodes serially or in parallel are also estimated.
  • the network topology of the system 200 is assumed to be a full binary tree with height h.
  • Each node in the network is a router with b+1 ports, one of which is connected to an active node. This way, each active node manages exactly one router.
  • Routes taken by packets are also assumed to be symmetrical; that is, protocol data units ("PDUs") of an SNMP request take the same path, from the manager to the managed device and vice versa.
  • PDUs protocol data units
  • the management station is assumed to be attached to the root of the tree of the system 100 and that all management program executions use the root as the start node. Finally, the management task is selected to be an operation that computes the average value of a specific management information base (“MIB”) variable across all nodes in the network.
  • MIB management information base
  • N the total number of nodes in the network, N, is therefore given by n h+1 -l
  • N - n-1
  • the most scalable manner to implement a task in a centralized management network solution is to compute the network- wide average value of the desired variable incrementally from the values obtained from each node that is polled via an SNMP GET. If polling is performed serially on N nodes (i.e., each GET operation must complete before the next GET is initiated), and if the time needed for the simple averaging computation is negligible, the total completion time is given by:
  • Ts is the time required by the SNMP agent on a node to process a request. Measurements on the Cisco 2621 routers shows this to be approximately 1.9 ms.
  • the total completion time is given by:
  • the Echo pattern 300 is used to accomplish the same task as accomplished above using the centralized network management solution.
  • the performance of the system 100 is measured against centralized management using the serial polling scheme as a common task.
  • the scalability measure S is defined to be the ratio between the average completion time of a management task using the serial polling scheme and the scheme underlying the specific management task (such as parallel polling or the Echo pattern 300).
  • FIG. 7 illustrates a chart 700 plotting the scalability measure S on the vertical axis against height of the network tree h on the horizontal axis.
  • Line 702 shows the scalability for the Echo pattern 300 when b is set at 2.
  • Line 704 shows the scalability for the Echo pattern 300 when b is set at 6.
  • Line 706 shows the scalability for the parallel polling approach when b is set at 2.
  • Line 708 shows the scalability for the parallel polling approach when b is set at 6.

Abstract

L'invention concerne un appareil, un procédé et un système logiciel permettant d'obtenir une gestion de réseau décentralisée basée sur les formes. L'appareil selon l'invention est un noeud réseau (206) comprenant un routeur (208) connecté à au moins un autre noeud réseau (216) d'une pluralité de noeuds réseau, ainsi qu'un processeur. Ce processeur est conçu pour recevoir un programme de gestion de réseau et des informations relatives à l'état mobile, déterminer si le programme de gestion de réseau doit être envoyé à au moins un autre noeud réseau de la pluralité de noeuds réseau, transmettre les informations relatives à l'état mobile à cet autre noeud, puis transmettre sélectivement le programme de gestion de réseau d'après le résultat de la détermination à au moins un autre noeud réseau de la pluralité de noeuds réseau.
EP04749822A 2003-04-07 2004-04-07 Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises Withdrawn EP1611527A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US46122103P 2003-04-07 2003-04-07
PCT/US2004/010646 WO2004092969A1 (fr) 2003-04-07 2004-04-07 Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises

Publications (1)

Publication Number Publication Date
EP1611527A1 true EP1611527A1 (fr) 2006-01-04

Family

ID=33299782

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04749822A Withdrawn EP1611527A1 (fr) 2003-04-07 2004-04-07 Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises

Country Status (6)

Country Link
EP (1) EP1611527A1 (fr)
JP (1) JP2006526359A (fr)
KR (1) KR20060024358A (fr)
AU (1) AU2004229924A1 (fr)
CA (1) CA2521814A1 (fr)
WO (1) WO2004092969A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2609512B1 (fr) * 2010-08-25 2015-10-07 Hewlett-Packard Development Company, L.P. Transfert de fichiers
EP2740242B8 (fr) * 2011-08-04 2019-01-23 Mido Holdings Ltd. Système et procédé d'implémentation et de gestion de réseaux virtuels
FI20126275L (fi) 2012-12-07 2014-06-08 Tellabs Oy Menetelmä ja laitteisto ohjelmallisesti määriteltävän verkon konfiguroimiseksi

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6681243B1 (en) * 1999-07-27 2004-01-20 Intel Corporation Network environment supporting mobile agents with permissioned access to resources
US6611864B2 (en) * 1999-09-10 2003-08-26 Intel Corporation Extensible policy-based network management architecture
US6529515B1 (en) * 1999-09-30 2003-03-04 Lucent Technologies, Inc. Method and apparatus for efficient network management using an active network mechanism
US6704730B2 (en) * 2000-02-18 2004-03-09 Avamar Technologies, Inc. Hash file system and method for use in a commonality factoring system
JP2002261800A (ja) * 2001-03-02 2002-09-13 Nec Corp サービス品質動的制御装置および制御方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2004092969A1 *

Also Published As

Publication number Publication date
WO2004092969A1 (fr) 2004-10-28
WO2004092969A9 (fr) 2005-04-07
KR20060024358A (ko) 2006-03-16
AU2004229924A1 (en) 2004-10-28
JP2006526359A (ja) 2006-11-16
CA2521814A1 (fr) 2004-10-28

Similar Documents

Publication Publication Date Title
Jansen et al. Shadow: Running Tor in a box for accurate and efficient experimentation
Nadeem et al. An ns-3 mptcp implementation
Lim et al. Weaver: realizing a scalable management paradigm on commodity routers
EP1611527A1 (fr) Systeme et procede permettant d'obtenir une gestion evolutive sur des routeurs de marchandises
Pozza et al. FlexState: Flexible state management of network functions
Sukapuram et al. Ppcu: Proportional per-packet consistent updates for sdns using data plane time stamps
Lim et al. Decentralizing network management
Zhao et al. AP-SDN: Action Program enabled Software-Defined Networking Architecture.
Zhou et al. Composing SDN controller enhancements with Mozart
Noferi et al. Rapid prototyping and performance evaluation of MEC-based applications
Zeng SEEDEMU: The SEED Internet Emulator
Rodolfi DTN discovery and routing: from space applications to terrestrial networks.
Geier et al. SherlockFog: a new tool to support application analysis in Fog and Edge computing
Glavind et al. Latte: Improving the latency of transiently consistent network update schedules
Patel A pragmatic testbed for distributed systems
Kellaway Accelerating the SCION IP Gateway using programmable data planes
Lim et al. Beehive: A Flexible Network Stack for Direct-Attached Accelerators
McClurg Correct-by-Construction Network Programming for Stateful Data-Planes
Παυλίδης ONOS controller compatibility with P4 programming language for Software Defined Networks
Sagkriotis Accelerating orchestration with in-network offloading
Alsaeed et al. A wide area network emulator for CORBA applications
Pozza et al. FlexState: Enabling Innovation in Network Function State Management
Laracy et al. Towards a Rigorous Software Architecture Documentation Process: A Demonstration with the Real-time Immersive Network Simulation Environment (RINSE)
ANTUNES TOWARDS GENERIC AND SCALABLE NETWORK EMULATION
Loukili Content Distribution over Software Defined Networks

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20051029

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL HR LT LV MK

DAX Request for extension of the european patent (deleted)
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1090997

Country of ref document: HK

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20080503

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1090997

Country of ref document: HK