[e2e] GRID Network Research
Hesham Elbakoury
helbakou at nortelnetworks.com
Wed May 8 14:23:21 PDT 2002
Hi Jon
What GRID stands for and what is its web site ?
Hesham
-----Original Message-----
From: Jon Crowcroft [mailto:Jon.Crowcroft at cl.cam.ac.uk]
Sent: Wednesday, May 08, 2002 9:11 AM
To: end2end-interest at postel.org
Subject: [e2e] GRID Network Research
the GGF (see usal web site) are interested in inpout on this:
(we will also generate a doc about the 10 things grid people wish
network people knew!)
comments to me!
cheers
jon
Outline Draft for:
Top ten things network engineers wish grid programmers knew
TBA:
Top ten things grid programmers wish network engineers knew
Jon Crowcroft et al...26/4/2002
Abstract
This is a draft contribution for a document for the GHPNRG
(see http://www.cs.wm.edu/~lowekamp/ghpnrg.html
amongst other places)
which is meant to list topics that the network community is
working on and is sometimes asked alarming questions about by
folks who make intensive (and quite well educated) use of
networks, such as Global GRID Forum people.
It is currently a list of topics and references. I might expand
the list, and it certainly needs lots of explanatory text. It
might be neat of this was from the GNT!.
1/ Congestion Control (contrariwise: see QoS)
Slow Start
is this always necessary? no, but beware of ISPs who
mandate it, and if you think you can use less than recent history rather
than recent measurements, look at the Congestion Manager and TCP
PCB state shearing work first!
Congestion Control
This is not optional in a non QoS network (which is just
about any network) - adaption is mandatory
AIMD and Equation Based
AIMD is not the only solution to a fair, convergent
control rule for congestion avoidance and control. Other
solution are around - Rate based, using loss, or ECN feedback,
can work to be TCP fair, but not generate the characteristic Saw
Tooth.
Assumptions and errors
Most _connections_ do not behave like the Padhye
equation, but most bytes are shipped on a small number of
connections , and do - c.f. Mice and Elephants.
The jury is still out on whether there are non greedy TCP flows
(ones who do not have infinite sources of data at any moment)
RMT and Unicast
Reliable Multicast Transport protocols (PGM, ALC) use
a variety of techniques to mimic TCP mainly.
Mobile and Congestion Control
Mobile nodes experience temporary indications of
loss AND congestion
during a hand-off. People have proposed mechanisms for
indicating whether these are "true" or chimera.
Economics, Fairness etc
Congestion control results in an approximately fair
distribution of bottleneck bandwidth - this may not be
great if you paid more to get a fat pipe to the net.
But, you are probably nearer the core and have
every right to ask the ISP to upgrade their bottlenecks anyhow
and the people that paid less should be bottlenecked at THEIR
access links in that case. So?
http://www.psc.edu/networking/tcp_friendly.html
2/ Routing
Priorities for good routing system design are:
Fast Forwarding
Packet classification and switched routers have come a
long way recently - we are unlikely in the software world to beat
the h/w in core routers, but we can compete nicely in access
devices - certainly, there is no reason why a small cluster
couldn;t make a good 10Gbps router - but there's every reason why
a PCI bus machine maxes out at 1Gbps!
Faster Convergence
Routers and links fail. the job of OSPF/ISIS and BGP is
to find the alternate paths quickly - in reality they take a
whole to converge - IGPs take a while (despite being mainly link
state nowadays) because link failure detection is NOT obvious -
sometimes you have to count missed HELLO packets (since some
links don't generate an explicit clock). BGP convergence is a
joke. But there are smart people on the case.
theory and practice
Most the problems with implementing routing protocols are those
of classic distributed (p2p/autonomous) algorithms: dealing with
bugs in other peoples implementations - it takes a good
programmer about 3 months to do a full OSPF. It then takes around
3 years to put in all the defences.
Better (multi-path, multi-metric) routing
equal cost Multipath OSPF and QOSPF
have been dreamt up - are they used a lot? multipath in limited
cases appears to work quite well. Multimetric relies on good
understanding of traffic engineering and economics, and to date,
hasn't seen the light of day. Note that also, in terrestrial tier
one networks, end-to-end delays are approaching transmission
delays, so asking for a delay (or jitter) bound is getting fairly
pointless - asking for a throughput guarantee is a good idea, but
doesn't need clever routing!
Does MPLS Help? No, not one bit.
Policies are hard - BGP allows one to express unilateral
policies to the planet. this is cute (the same idea could be used
for policy management of other resources like CPUs in the GRID)
however, it results in difficulties in computing global choices
(esp Multihoming) - there are fixes.
http://www.potaroo.net/
http://www.telstra.net/gih
NANOG
3/ Packet Sizes
Go faster LANs have always pushed the MTU up - since ATM LANs
(remember the fore asx100) we tried 9280 byte packets, and
enjoyed things. But the GRID is global, so the MTU is that of the
weakest link. Most stuff is on 100BaseT somewhere on the path
so we aren't likely to see more than the occasional special case
non 1500 byte path. However, with path MTU discovery, we get that
auto-magically
Multicast MSS is a real problem:)
Sub-IP packet size is a consideration - some systems (ATM) break
packets into tiny little pieces, then apply various level2
schemes to these pieces (e.g. rate/congestion control) - most
these are anathema to good performance.
http://www.nlanr.net/NA/Learn/packetsizes.html
http://www.faqs.org/rfcs/rfc1191.html
etc
4/ Overlays
Overlays and P2p (e.g. Pastry, CAN, Tapastry)
are becoming commonplace - the routing overlay du jour is
probably RON from MIT - these (at best) are an auto-magic way of
configuring a set of Tunnels (IPinIP, GRE etc). I.e. they build
you VPNs
P2P: are slightly different - they do content sharing and have
cute index/search/replication strategies varying from
mind-numbingly stupid (napster, gnutella) to very cute (CAN,
Pastry). They have problems with
Locality and Metrics so are not the tool for the job for low
latency file access....in trying to mitigate this , they (and
overlay routing substrates) use ping and pathchar to try to find
proximal nodes:
limitations of Ping/Pathchar
Convergence when not native (errors/confidence)
Peer-to-Peer Harnessing the Power of Disruptive Technologies
Edited by Andy Oram, March 2001, 0-596-00110-X
5/ QoS (contrariwise: see Congestion Control)
QoS - would be a nice thing
Parameters typically include
Throughout
Delay
Availability
Some people add security/integrity
Some people also mention loss...
Threats
Theft and Denial of Service
Protection is really what people want - If I send x bps
to site S, what y bps will be received, how much d later?
to guarantee y=x, and d is minimised, you need
Admission Control (so we are not sharing as we would if
we adapted under congestion control)
Scheduling (so we do not experience arbitrary queueing
delays)
Re-routing may also need to be controlled and pre-empted
alternate routes (also known, unfortunately as protection paths)
may be needed if we want QoS to include availability as well as
throughput guarantees and delay bounds.
Network Structure
"edge", "core", etc is a myth 0- in the global net the
average traffic path includes 7 ASs - most inter-domain traffic
traverses heavily used Internet Exchange points (e.g. London)
where capacity only just about matches demand, whereas core
networks are often "over-provisioned" (UK academic net now runs at
<5% utilisation).
Aggregation is a technique to scale traffic management for QoS -
by only managing classes of aggregates of flows, we get to reduce
the state and signaling/management overhead for it. VPNs/tunnels
of course are aggregation techniques, as are things that treat
packet differently on subfields like DSCP, port etc etc
SLAs are around already despite non widespread QoS - however,
SLAs are only intra-ISP to my knowledge (some Internet Exchanges
offer SLAs but end 2 end SLAs are as scarce as dragons).
Economics - are important here again as you can imagine!
An Engineering Approach to Computer Networking
Keshav, 1997, Addison-Wesley Pub Co; ISBN: 0201634422
or
Internet QoS: Architectures and Mechanisms for Quality of Service
by Zheng Wang, 2001, Morgan Kaufmann Publishers; ISBN: 1558606084
6/ Multicast
Tier 1 routing works. Most ISPs run core native multicast
Interdomain only just limps (its getting better...
MSDP Problems
App Relay Solutions
RMT - we have some candidate protocols for reliable multicast -
nothing as solid as 1988 TCP quite yet tho.
Address Allocation and Directories are not great yet, hence
beacons and so on.
Access Network are in bad shape...e.g.
DSLAMs dont do IGMP snooping
Cable dont do IGMP snooping
Dialup cant hack it at all
Does IPv6 Help (don't laugh!) - yes it might!
Developing IP Multicast Networks: The Definitive Guide to
Designing and Deploying CISCO IP Multicast Networks
by Beau Williamson, 2000, Cisco Press; ISBN: 157870077
and
Multicast Communication: Protocols, Programming, and Applications
by Ralph Wittmann, Martina Zitterbart
Morgan Kaufmann Publishers; ISBN: 1558606459
7/ Operating Systems
Linux, Solaris etc...there's a lot we could say here - lots of
things can and should be configured
zero copy stack - we'd all like this - zero copy receive is hard;
RDMA is not obviously the answer
Interrupts (self selecting NICs) we should minimises these if we
want TCP to go to 10Gbps on a reasonable processor - there are
nice techniques
socket buffer considerations -there are lots!
protection and scheduling domains - if we could get away from OSs
that confused these , life would be easier!
W Richard Stevens, TCP/IP Illustrated, All Volumes.
AND
Understanding the Linux Kernel,
D.P. Bovet and M. Cesati, O'Reilly, 2001,
ISBN 0-596-00002-2
8/ Layer 2 Considerations
layer 2 NBMA nets - lots - a pain
layer 2 shared media nets - was decreasing due to switched ether,
now increasing due to wireless.
switching and routing re-cursed - layer 2 switching and routing
usually makes life HARDER for the IP engineer.
flow and congestion control re-cursed - layer 2 reliability and
flow control almost ALWAYS make life worse for the IP and TCP
engineer.
signaling (implicit, explicit) is just painful.
802.11 - in its glory:
http://www.apple.com/ibook/wireless.html
General discussion of slow lossy links:
http://www.ietf.org/html.charters/pilc-charter.html
WAP horrors - see web for many stories
GPRS - see:
http://www.cl.cam.ac.uk/Research/SRG/netos/coms/index.html
Other end of "Spectrum", see
http://www.cis.ohio-state.edu/~jain/refs/opt_refs.htm
(includes Raj Jain's own list of hot topics!)
9/ Light v. Heavyweight Protocols
Header prediction, Packet templates make
Code complexity a lot lower in the common case even for a big
protocol like TCP or SCTP.
"User space" v. kernel myths - in this authors experience it is
really worth getting people to put transports into the kernel -
reasons include independent failure of application and protocol
as well as good control of end system resources. It ain't that
hard and user space will just almost never be as fast.
Computer Networks, A Systems Approach
Peterson and Davie,
Morgan Kaufmann, 1996, ISBN 1-55860-368-9
(2nd ed. too)
10/ Macroscopic Traffic and System Considerations
Self similarity, so?
traffic is self similar (i.e. arrivals are not i.i.d) -
this doesn't actually matter much (there is a horizon effect)
traffic phase effects
p2p (IP router, multiparty applications etc)
have a tendency (like clocks on a wooden door, or
fireflies in the mekong delta) to synchronise 0- this is
a bad thing
flash crowds
e.g. genome publication of new result followed
by simultaneous dbase search with similar queries from
lots of different places...
Asymmetry
Many things in the net are asymmetric - see ADSL lines,
see client-server, master-slave, see most NAT boxes. See BGP
paths. beware - assumptions about symmetry (e.g. deriving 1 way
delay from RTT) are often wildly wrong. Asymmetry also breaks all
kinds of middle box snooping behaviour.
The Art of Computer Systems Performance Analysis
Raj Jain, 1991, Wiley, ISBN 0-471-50336-3
Web Protocols and Practice
B. Krishnamurthy & J. Rexford,
Addison Wesley, 2001, ISBN 0-201-710885
Security Engineering,
Ross Anderson, 2001 Wiley & Sons; ISBN: 0471389226
------------------------------------
Global Reference:
ACM CCR 25th Anniversary Edition,
ACM SIGCOMM CCR, Volume 25, No.1 January 1995,
ISSN #: 0146-4833
http://www.acm.org/sigcomm/ccr/archive/ccr-toc/ccr-toc-95.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.postel.org/pipermail/end2end-interest/attachments/20020508/c937194b/attachment.html
More information about the end2end-interest
mailing list