skip to main content
article

CONMan: a step towards network manageability

Published:27 August 2007Publication History
Skip Abstract Section

Abstract

Networks are hard to manage and in spite of all the so called holistic management packages, things are getting worse. We argue that the difficulty of network management can partly be attributed to a fundamental flaw in the existing architecture: protocols expose all their internal details and hence, the complexity of the ever-evolving data plane encumbers the management plane. Guided by this observation, in this paper we explore an alternative approach and propose Complexity Oblivious Network Management (CONMan), a network architecture in which the management interface of data-plane protocols includes minimal protocol-specific information. This restricts the operational complexity of protocols to their implementation and allows the management plane to achieve high level policies in a structured fashion. We built the CONMan interface of a few protocols and a management tool that can achieve high-level configuration goals based on this interface. Our preliminary experience with applying this tool to real world VPN configuration indicates the architecture's potential to alleviate the difficulty of configuration management.

References

  1. M. B. Abbott and L. L. Peterson, "A language-based approach to protocol implementation,"in Proc. of ACM SIGCOMM, 1992, pp. 27--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Amiri, S. Calo, and D. Verma, "Policy based management of content distribution networks," IEEE Network Magazine, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Andersson and T. Madsen, "RFC 4026 - Provider Provisioned Virtual Private Network (VPN) Terminology," March 2005.Google ScholarGoogle Scholar
  4. H. Ballani and P. Francis, "Complexity Oblivious Network Management: A step towards network manageability," Cornell University, Ithaca, NY, US, Tech. Rep. cul.cis/TR2006-2026, 2006.Google ScholarGoogle Scholar
  5. E. Biagioni, "A structured TCP in standard ML," in Proc. of ACM SIGCOMM, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe, "Design and Implementation of a Routing Control Platform ," in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Carsten Schmidt, "Interface Traffic Monitor Pro," http://software.ccschmidt.de/.Google ScholarGoogle Scholar
  8. M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A Protection Architecture for Enterprise Networks," in Proc. of Usenix Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. D. Clark, C. Partridge, J. C. Ramming, and J. T. Wroclawski, "A knowledge plane for the internet," in Proc. of ACM SIGCOMM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Condie, J. M. Hellerstein, P. Maniatis, S. Rhea, and T. Roscoe, "Finally, a Use for Componentized Transport Protocols," in Proc. of the Fourth Workshop on Hot Topics in Networking, 2005.Google ScholarGoogle Scholar
  11. N. Feamster and H. Balakrishnan, "Detecting BGP Configuration Faults with Static Analysis," in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Ford, "Unmanaged Internet Protocol: taming the edge network management crisis," SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Goldszmidt, Y. Yemini, and S. Yemini, "Network management by delegation: the MAD approach," in Proc. of the conference of the Centre for Advanced Studies on Collaborative research (CASCON), 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Meyers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, "A clean slate 4D approach to network control and management," ACM SIGCOMM Computer Communications Review, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Guttman, "Autoconfiguration for ip networking: Enabling local communication," IEEE Internet Computing, vol. 5, no. 3, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Halpern and E. Ellesson, "The IETF Policy Framework Working Group," Online Charter, http://www.ietf.org/html.charters/OLD/policy-charter.html.Google ScholarGoogle Scholar
  17. M. Jude, "Policy-based Management: Beyond The Hype," Business Communication Review, pp. 52--56, 2001, http://www.bcr.com/bcrmag/2001/03/p52.php.Google ScholarGoogle Scholar
  18. Z. Kerravala, "Enterprise Networking and Computing: the Need for Configuration Management," Yankee Group report, January 2004.Google ScholarGoogle Scholar
  19. E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, "The Click modular router," ACM Transactions on Computer Systems, vol. 18, no. 3, pp. 263--297, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. R. Kompella, A. Greenberg, J. Rexford, A. C. Snoeren, and J. Yates, "Cross-layer Visibility as a Service," in Proc. of workshop on Hot Topics in Networks, 2005.Google ScholarGoogle Scholar
  21. R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren, "IP Fault Localization Via Risk Modeling ," in Proc. of 2nd Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Backbone Failures," in Proc. of Symposium on Fault-Tolerant Computing (FTCS), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K.-S. Lim and R. Stadler, "Developing Pattern-Based Management Programs," in Proc. of Conference on Management of Multimedia Networks and Services (MMNS), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica, "Implementing Declarative Overlays," in Proc. of ACM SOSP, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. T. Loo, J. M. Hellerstein, I. Stoica, and R. Ramakrishnan, "Declarative Routing: Extensible Routing with Declarative Queries," in Proc. of ACM SIGCOMM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. of ACM SIGCOMM, 2002, pp. 3--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C. Chuah, and C. Diot, "Characterization of Failures in an IP Backbone," in Proc. of IEEE INFOCOMM, 2004.Google ScholarGoogle Scholar
  28. D. Oppenheimer, A. Ganapathi, and D. Patterson, "Why do Internet services fail, and what can be done about it," in Proc. of USENIX Symposium on Internet Technologies and Systems, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. Bahl et. al., "Discovering Dependencies for Network Management," in Proc. of workshop on Hot Topics in Networks, 2006.Google ScholarGoogle Scholar
  30. V. A. Pham and A. Karmouch, "Mobile Software Agents: An Overview," IEEE/ACM Trans. Netw., vol. 36, no. 7, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Pierrick Simier, "SNMPLink," www.snmplink.org/Tools.html.Google ScholarGoogle Scholar
  32. R. Rajan, D. Verma, S. Kamat, E. Felstaine, and S. Herzog, "A policy framework for integrated and differentiated services in the internet," IEEE Network Magazine, vol. 13, no. 5, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. E. Rosen and Y. Rekhter, "RFC 4364 - BGP/MPLS IP Virtual Private Networks (VPNs)," February 2006.Google ScholarGoogle Scholar
  34. J. Schonwalder, "Characterization of SNMP MIB Modules," in Proc. of International Symposium on Integrated Network Management, 2005.Google ScholarGoogle Scholar
  35. Tobias Oetiker and Dave Rand, "MRTG: Multi Router Traffic Grapher," http://mrtg.hdl.com. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. H. Uijterwaal and M. Zekauskas, "IP Performance Metrics (ippm)," Online Charter, Jan 2006, http://www.ietf.org/html.charters/ippm-charter.html.Google ScholarGoogle Scholar
  37. D. Verma, "Simplifying Network Administration using Policy based Management," IEEE Network Magazine, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. G. von Bochmann, "Usage of Protocol Development Tools: The Results of a Survey," in Proc. of Conference on Protocol Specification, Testing and Verification, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson, "Routing design in operational networks: a look from the inside," in Proc. of ACM SIGCOMM, 2004, pp. 27--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. E. R. Y. Rekhter, R. Bonica, "Use of PE-PE GRE or IP in BGP/MPLS IP Virtual Private Networks," draft-ietf-l3vpn-gre-ip-2547-05, February 2006.Google ScholarGoogle Scholar
  41. "CISCO 802.1Q Tunneling," http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1219ea1/3550scg/swtunnel.htm.Google ScholarGoogle Scholar
  42. "CISCO Network Management Products," http://www.cisco.com/en/US/products/sw/netmgtsw/index.html.Google ScholarGoogle Scholar
  43. "HP OpenView," www.openview.hp.com/.Google ScholarGoogle Scholar
  44. "IBM's Autonomic Computing," http://www-03.ibm.com/autonomic/.Google ScholarGoogle Scholar
  45. "Microsoft Dynamic Systems Initiative," http://www.microsoft.com/windowsserversystem/dsi/default.mspx.Google ScholarGoogle Scholar
  46. "UPnP Forum," http://www.upnp.org/.Google ScholarGoogle Scholar
  47. "Wireshark: A Network Protocol Analyzer," http://www.wireshark.org/.Google ScholarGoogle Scholar
  48. "IBM Research: Policy-based Networking," Dec 2006, http://www.research.ibm.com/policy/.Google ScholarGoogle Scholar
  49. "SNMP MIB Search Engine," January 2006, www.mibdepot.com.Google ScholarGoogle Scholar
  50. "Digital Living Network Alliance," Jan 2007, http://www.dlna.org/.Google ScholarGoogle Scholar
  51. "Zeroconf Working Group," Jan 2007, http://www.zeroconf.org/.Google ScholarGoogle Scholar

Index Terms

  1. CONMan: a step towards network manageability

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
      October 2007
      420 pages
      ISSN:0146-4833
      DOI:10.1145/1282427
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2007
        432 pages
        ISBN:9781595937131
        DOI:10.1145/1282380

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 August 2007

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader