360 likes | 493 Views
Theophilus Benson *, Aditya Akella *, Aman Shaikh + *University of Wisconsin, Madison + ATT Labs Research. Demystifying Configuration Challenges and Trade -Offs in Network-based ISP Services. Adoption of Network-based Services. ISP Core. Adoption of Network-based Services.
E N D
Theophilus Benson*, AdityaAkella*, Aman Shaikh+ *University of Wisconsin, Madison + ATT Labs Research Demystifying Configuration Challenges and Trade-Offs in Network-based ISP Services
Adoption of Network-based Services ISP Core
Adoption of Network-based Services • “By 2015, annual global IP traffic will reach 966 exabytes” [Cisco’11] • Customers adopting new applications • ISPs upgrade and purchase new equipment • Best effort ineffective for some applications
Adoption of Network-based Services • Host-based and network-based services • “AT&T to spend $1 billion to ramp up enterprise services” • Recover cost and improve application performance ISP Core • Services are a crucial part of the Internet’s ecosystem
Goals • Vision: • Improve service integration/upgrades • Simplify service management • Understand impediments • Service configuration files • Complexity of configuration Edge ISP Core Edge
Configuration is a crucial component • Configuration determines • Customer functionality • ISP interactions • Configuration is complex • Most time consuming task [Feamster ‘05 ] • Most error-prone • > 50% customer problems due to configuration errors [Yankee Group ‘04] OSPF BGP
Configuring a Service Control Plane a a a c c c z z z ISP Core PE CE CE PE Data plane
Contributions • Analyzed 2.5 years of configurations • Show how complexity evolves over time • Worsens over time • Highlight the location of complexity • Complexity exists at the edge • Identify the cause of complexity • Due to provisioning of new customers ISP Core PE CE PE Edge Customers Edge Customers
Contributions • Identified potential ways to mitigate complexity • Showed the impact of design choices on complexity Complexity Complexity #1 #2 #1 #2 #3 Routing Design Vendor
Outline • Motivation • Background • Models and Data-Set • Understanding Complexity • Mitigating Complexity • Conclusion
Configuring the Provider’s Edge ISP Core • Complexity is due to: • Dependent commands a PE CE CE PE Ipvrf blue Rd 23234:100223 Route-target import 1000:1 Route-target export 1000:1 ! Interface ethernet1 Ip address 128.105.82.66/30 Ipvrf forwarding blue Services-policy output policy1 ! Policy-map policy1 Policy 100 20 confirm-action transmit VRF Interface Policy-map
Configuring the Control-Plane Core a a a c c c z z z • Complexity is due to: • Dependent commands • Maintaining consistency ISP Core PE CE CE PE Ipvrf blue Rd 23234:100223 Route-target import 1000:1 Route-target export 1000:1 ! Router bgp 65000 Neighbor 129.168.2.1 Neighbor 129.168.2.1 Router bgp 65000 Neighbor 129.168.6.6 Neighbor 129.168.2.2 !
Configuring the Data-Plane Core a a a c c c z z z ISP Core • Complexity is due to: • Dependent commands • Maintaining consistency PE CE a CE PE Ipvrf blue Rd 23234:100223 Route-target import 1000:1 Route-target export 1000:1 ! Interface gigethernet1 Ip address 128.105.82.65/30 ! Interface gigethernet1 Ip address 128.105.82.66/30 ! Router ospf 2 Network 128.105.82.0/24 !
Requirements for Data Models • Quantify complexity of configuration • Capture dependencies between commands • Capture consistency across devices • Use complexity metrics [Benson ‘09] • Motivated by software engineering techniques • Abstract away low level details • Abstract groups of commands stanzas Ipvrf blue Rd 23234:100223 ! Interface ethernet1 Ip address 128.105.82.66Ipvrf forwarding blue Services-policy input policy2 !
Data Models VRF • Referential Graph [Benson ‘09] • Syntactic dependenciesoperators must track • Network graph of dependent stanzas • Metric: size of graph • Larger graph more dependencies • Templates [Benson ‘09] • Clone detection used to capture uniformity Interface Policy-map
Data-Set • Collected data from tier-1 ISP for 2.5 years • 5 services: VPN, VPLS, VoIP, DDoS Prev., Virtual Wire • Daily snapshots of router configuration files • Metadata (per router): vendor, role and location • Diversity allows for a comprehensive study
Understanding Complexity • Provider Edge (PE) Complexity • Control-Plane Core Complexity • Data-Plane Core Complexity ISP Core PE CE PE
Understanding Complexity • Provider Edge (PE) Complexity • Control-Plane Core Complexity • Data-Plane Core Complexity ISP Core PE CE PE
PE Complexity over Time • Growth is due to worsening complexity • New devices have less dependencies • Over time, configuration tasks become tricky
Understanding PE Complexity • Which stanza contributes to VPLS growth? VRF VRF Interface ISP Core Edge Policy-map Edge
Understanding PE Complexity • Which stanza contributes to VPN growth? VRF Interface ISP Core Edge Policy-map Edge • Complexity caused by customer provisioning
Configuration Reuse over Time 88% 62% 71% • Reuse and specialization exists • Configuration overlap reduces over time • Reduction due to specialized usage of service • Specialization leads to added complexity
Understanding Complexity • Data-Plane Core: service-agnostic and simple • Control-Plane Core: distinct across services • Growing number of adjacencies with PEs • PE is the most complex ISP Core PE CE PE
Mitigating Complexity • Vendor Selection Complexity Complexity Functionality Time Time Cost Complexity
How to Compare Vendors • Different vendors different languages • Language impacts complexity • Difference in structure of functionality • Comparing vendor languages • Configurations representing same policy • Same customer same policy on all PEs Vendor2 Vendor1 ISP Core PE CE CE PE
Vendor Selection • Graph for vendor1 is consistently larger • Vendor1 requires more stanzas for same policies • Operators need to track more dependencies • Choice of vendor can reduce PE complexity
Conclusion • Studied the factors that impedeservices • Complexity grows over time • Modifications become time consuming • Most complexity lies in configuring customers • Varying requirements and specialized configuration • Framework to systematically consider complexity • Choice of vendor can reduce complexity
Thank You • Theophilus Benson (tbenson@cs.wisc.edu) • "Complex systems are built out of a myriad of simple components"
Related Works • Customer usage patterns • Traffic matrixes [Garimella’07,Qiu’09,] • Control plane state [Raghunath’05] • Techniques for optimizing services • Improve hardware usage [Kim’08,Raghunath’07] • Very little on configuration • Modeling Class-of-Service [Sung’08] • Root cause analysis [Mahimkar’10, Turner’10] • Complementary to understanding complexity PE CE ISP Core CE PE
Future Works • Automated simplification of configuration • Utilizing insights on design choices • New abstraction layer • Policy language for simpler configuration • Translates language to configuration • Correlate complexity with manageability
Customer Provisioning • Customer provisioning causes complexity • Provisioning should slightly increase complexity • Similar functionality for all customers • Small change in configurations • Modular configuration languages • Reuse of configurations between customers
Similarities Across Customers • Customers are not created equally • VPLS: 2 types of customers • VPN: Multiple types of customers • Groups of customers use services differently • Differences in requirements introduces complexity