Abstract
Networks are hard to manage and in spite of all the so called holistic management packages, things are getting worse. We argue that the difficulty of network management can partly be attributed to a fundamental flaw in the existing architecture: protocols expose all their internal details and hence, the complexity of the ever-evolving data plane encumbers the management plane. Guided by this observation, in this paper we explore an alternative approach and propose Complexity Oblivious Network Management (CONMan), a network architecture in which the management interface of data-plane protocols includes minimal protocol-specific information. This restricts the operational complexity of protocols to their implementation and allows the management plane to achieve high level policies in a structured fashion. We built the CONMan interface of a few protocols and a management tool that can achieve high-level configuration goals based on this interface. Our preliminary experience with applying this tool to real world VPN configuration indicates the architecture's potential to alleviate the difficulty of configuration management.
- M. B. Abbott and L. L. Peterson, "A language-based approach to protocol implementation,"in Proc. of ACM SIGCOMM, 1992, pp. 27--38. Google ScholarDigital Library
- K. Amiri, S. Calo, and D. Verma, "Policy based management of content distribution networks," IEEE Network Magazine, March 2002. Google ScholarDigital Library
- L. Andersson and T. Madsen, "RFC 4026 - Provider Provisioned Virtual Private Network (VPN) Terminology," March 2005.Google Scholar
- H. Ballani and P. Francis, "Complexity Oblivious Network Management: A step towards network manageability," Cornell University, Ithaca, NY, US, Tech. Rep. cul.cis/TR2006-2026, 2006.Google Scholar
- E. Biagioni, "A structured TCP in standard ML," in Proc. of ACM SIGCOMM, 1994. Google ScholarDigital Library
- M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe, "Design and Implementation of a Routing Control Platform ," in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarDigital Library
- Carsten Schmidt, "Interface Traffic Monitor Pro," http://software.ccschmidt.de/.Google Scholar
- M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A Protection Architecture for Enterprise Networks," in Proc. of Usenix Security, 2006. Google ScholarDigital Library
- D. D. Clark, C. Partridge, J. C. Ramming, and J. T. Wroclawski, "A knowledge plane for the internet," in Proc. of ACM SIGCOMM, 2003. Google ScholarDigital Library
- T. Condie, J. M. Hellerstein, P. Maniatis, S. Rhea, and T. Roscoe, "Finally, a Use for Componentized Transport Protocols," in Proc. of the Fourth Workshop on Hot Topics in Networking, 2005.Google Scholar
- N. Feamster and H. Balakrishnan, "Detecting BGP Configuration Faults with Static Analysis," in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarDigital Library
- B. Ford, "Unmanaged Internet Protocol: taming the edge network management crisis," SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, 2004. Google ScholarDigital Library
- G. Goldszmidt, Y. Yemini, and S. Yemini, "Network management by delegation: the MAD approach," in Proc. of the conference of the Centre for Advanced Studies on Collaborative research (CASCON), 1991. Google ScholarDigital Library
- A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Meyers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, "A clean slate 4D approach to network control and management," ACM SIGCOMM Computer Communications Review, October 2005. Google ScholarDigital Library
- E. Guttman, "Autoconfiguration for ip networking: Enabling local communication," IEEE Internet Computing, vol. 5, no. 3, 2001. Google ScholarDigital Library
- J. Halpern and E. Ellesson, "The IETF Policy Framework Working Group," Online Charter, http://www.ietf.org/html.charters/OLD/policy-charter.html.Google Scholar
- M. Jude, "Policy-based Management: Beyond The Hype," Business Communication Review, pp. 52--56, 2001, http://www.bcr.com/bcrmag/2001/03/p52.php.Google Scholar
- Z. Kerravala, "Enterprise Networking and Computing: the Need for Configuration Management," Yankee Group report, January 2004.Google Scholar
- E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, "The Click modular router," ACM Transactions on Computer Systems, vol. 18, no. 3, pp. 263--297, August 2000. Google ScholarDigital Library
- R. R. Kompella, A. Greenberg, J. Rexford, A. C. Snoeren, and J. Yates, "Cross-layer Visibility as a Service," in Proc. of workshop on Hot Topics in Networks, 2005.Google Scholar
- R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren, "IP Fault Localization Via Risk Modeling ," in Proc. of 2nd Symp. on Networked Systems Design and Implementation (NSDI), 2005. Google ScholarDigital Library
- C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Backbone Failures," in Proc. of Symposium on Fault-Tolerant Computing (FTCS), 1999. Google ScholarDigital Library
- K.-S. Lim and R. Stadler, "Developing Pattern-Based Management Programs," in Proc. of Conference on Management of Multimedia Networks and Services (MMNS), 2001. Google ScholarDigital Library
- B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica, "Implementing Declarative Overlays," in Proc. of ACM SOSP, 2005. Google ScholarDigital Library
- B. T. Loo, J. M. Hellerstein, I. Stoica, and R. Ramakrishnan, "Declarative Routing: Extensible Routing with Declarative Queries," in Proc. of ACM SIGCOMM, 2005. Google ScholarDigital Library
- R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. of ACM SIGCOMM, 2002, pp. 3--16. Google ScholarDigital Library
- A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C. Chuah, and C. Diot, "Characterization of Failures in an IP Backbone," in Proc. of IEEE INFOCOMM, 2004.Google Scholar
- D. Oppenheimer, A. Ganapathi, and D. Patterson, "Why do Internet services fail, and what can be done about it," in Proc. of USENIX Symposium on Internet Technologies and Systems, 2003. Google ScholarDigital Library
- P. Bahl et. al., "Discovering Dependencies for Network Management," in Proc. of workshop on Hot Topics in Networks, 2006.Google Scholar
- V. A. Pham and A. Karmouch, "Mobile Software Agents: An Overview," IEEE/ACM Trans. Netw., vol. 36, no. 7, 1998. Google ScholarDigital Library
- Pierrick Simier, "SNMPLink," www.snmplink.org/Tools.html.Google Scholar
- R. Rajan, D. Verma, S. Kamat, E. Felstaine, and S. Herzog, "A policy framework for integrated and differentiated services in the internet," IEEE Network Magazine, vol. 13, no. 5, September 1999. Google ScholarDigital Library
- E. Rosen and Y. Rekhter, "RFC 4364 - BGP/MPLS IP Virtual Private Networks (VPNs)," February 2006.Google Scholar
- J. Schonwalder, "Characterization of SNMP MIB Modules," in Proc. of International Symposium on Integrated Network Management, 2005.Google Scholar
- Tobias Oetiker and Dave Rand, "MRTG: Multi Router Traffic Grapher," http://mrtg.hdl.com. Google ScholarDigital Library
- H. Uijterwaal and M. Zekauskas, "IP Performance Metrics (ippm)," Online Charter, Jan 2006, http://www.ietf.org/html.charters/ippm-charter.html.Google Scholar
- D. Verma, "Simplifying Network Administration using Policy based Management," IEEE Network Magazine, March 2002. Google ScholarDigital Library
- G. von Bochmann, "Usage of Protocol Development Tools: The Results of a Survey," in Proc. of Conference on Protocol Specification, Testing and Verification, 1987. Google ScholarDigital Library
- G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson, "Routing design in operational networks: a look from the inside," in Proc. of ACM SIGCOMM, 2004, pp. 27--40. Google ScholarDigital Library
- E. R. Y. Rekhter, R. Bonica, "Use of PE-PE GRE or IP in BGP/MPLS IP Virtual Private Networks," draft-ietf-l3vpn-gre-ip-2547-05, February 2006.Google Scholar
- "CISCO 802.1Q Tunneling," http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1219ea1/3550scg/swtunnel.htm.Google Scholar
- "CISCO Network Management Products," http://www.cisco.com/en/US/products/sw/netmgtsw/index.html.Google Scholar
- "HP OpenView," www.openview.hp.com/.Google Scholar
- "IBM's Autonomic Computing," http://www-03.ibm.com/autonomic/.Google Scholar
- "Microsoft Dynamic Systems Initiative," http://www.microsoft.com/windowsserversystem/dsi/default.mspx.Google Scholar
- "UPnP Forum," http://www.upnp.org/.Google Scholar
- "Wireshark: A Network Protocol Analyzer," http://www.wireshark.org/.Google Scholar
- "IBM Research: Policy-based Networking," Dec 2006, http://www.research.ibm.com/policy/.Google Scholar
- "SNMP MIB Search Engine," January 2006, www.mibdepot.com.Google Scholar
- "Digital Living Network Alliance," Jan 2007, http://www.dlna.org/.Google Scholar
- "Zeroconf Working Group," Jan 2007, http://www.zeroconf.org/.Google Scholar
Index Terms
- CONMan: a step towards network manageability
Recommendations
CONMan: a step towards network manageability
SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communicationsNetworks are hard to manage and in spite of all the so called holistic management packages, things are getting worse. We argue that the difficulty of network management can partly be attributed to a fundamental flaw in the existing architecture: ...
CONMan: taking the complexity out of network management
INM '06: Proceedings of the 2006 SIGCOMM workshop on Internet network managementNetwork management is difficult, costly, and error prone, and this is becoming more so as network complexity increases. We argue that this is an outcome of two fundamental flaws in the existing architecture: the management plane depends on the data ...
The SmartFrog configuration management framework
SmartFrog is a framework for creating configuration-driven systems. It has been designed with the express purpose of making the design, deployment and management of distributed component-based systems simpler and more robust. Over the last decade it has ...
Comments