390 likes | 519 Views
On the Robustness of Soft State Protocols. B00902028 屠政皓 B00902071 龔逸軒. Reading materials . On the Robustness of Soft State Protocols Author: John C.S. Lui , Vishal Misra , Dan Rubenstein . Outline . Introduction Motivation The impact of the refresh timer value
E N D
On the Robustness of Soft State Protocols B00902028 屠政皓 B00902071 龔逸軒
Reading materials • On the Robustness of Soft State Protocols • Author: John C.S. Lui, Vishal Misra, Dan Rubenstein
Outline • Introduction • Motivation • The impact of the refresh timer value • Correlated, lossy feedback channel • Broadcast flooding • Conclusion
Communication protocol A procedure used by 2 interacting parties to exchange information Often maintain a modifiable “state” that is used to track the progress of communication
“softness” of a protocol state Default value : A communication endpoint's state can take on several values Reverts to its default value if the endpoint receives no communication within a time period. Commonly referred to as the timeout period.
“softness” of a protocol state The manner in which the timeout mechanism is used Hard state: used only as an emergency failsafe Soft state: utilize timeout mechanism under normal operating condition
The principle difference the time over which the refresh timer expires the soft state protocol requires a small amount of additional time after the session officially ends for the refresh timer to expire and reset the sender to its default state.
robustness The protocol's performance under a variety of network conditions is above an acceptable threshold. Need not be optimal
characteristics of soft state protocol Soft state protocols are less trusting of misbehaving endpoints. DOS attack
characteristics of soft state protocol Soft state protocols use the timeout mechanism to create a virtual, predictable, feedback channel. Correlated lossy feedback channel
characteristics of soft state protocol Soft state protocols are less likely to flood the network with signaling traffic Broadcast flooding
The impact of refresh timer value Application-specific inconsistency cost. State (Re)Initialization cost. Refresh overhead. Stale state cost.
Analytical model Life time: L I:initialization state V: valid state TD: tear down S: stale state Refresh every R time unit
Choosing the right R The principle difference between soft and hard state protocol Refresh and teardown message has a loss probability p Number of refresh event: L/R Measuring performance by calculating cost C(R)
Calculating Cost #loss refresh message: pL/R Protocol enters an inconsistent state Tradeoff between long time spent in inconsistent state ,or more refresh messages
Calculating Cost A reinitialize cost when entering inconsistent state Time spent in inconsistent state: pL #(re)initialization : 1+pL/R
Calculating Cost Stale state cost: Proportion to refresh time interval R For soft state protocol ,this cost is incurred every time a state expires For hard state protocol, it is incurred when a state removal message gets lost
Fundamental hard vs soft tradoff • Optimal Refresh time interval ∝ • Cost of concern • a: refresh overhead , initialization cost • b: stale state cost • The protocol is “harder” if is larger
Comparison • X-axis: loss probability • Y: cost
DOS attack • Denial of service • An attacker reserves a resource , and then exiting without tearing down the connection • Life time = 0 ,channel loss probabilty = 1
A Correlated, Lossy Feedback Channel • Problem • congestion collapse • Model • Initial new sessions with rate λ • Mean time complete the transfer of data is 1/μ • active session and inactive session Sever can be simultaneously host up to N sessions Channel can support N < M sessions without loss
A Correlated, Lossy Feedback Channel (cont.) • Hard state protocol • Client attempts n times to deliver a message to the server to terminate the connection • soft state fail safe: a time with mean 1/μt after the client aborts, server can sense the absence of client and terminate • Soft state protocol • clients ping the server at high rate • when the server does not receive the ping for a time with mean 1/μs , it terminates • 1/μs << 1/μt
A Correlated, Lossy Feedback Channel (cont.) • CTMC model • State (i, j), i: number of active sessions, j: number of inactive sessions • p(i, j) is the loss probability in (i, j), x(i, j) is the probability client fails to inform server its departure
A Correlated, Lossy Feedback Channel (cont.) • CTMC for hard date protocol • CTMC for soft state protocol
A Correlated, Lossy Feedback Channel (cont.) • Analysis
Broadcast flooding • Problem • implosion • scenario • The server performs the broadcast as long as there exists a client interested receiving the data • Clients communicate to the server via unicast and the messages are queued at the server for processing • arrival rate of the massage that clients interested in broadcast is λ • interest lasts for a time exponentially distributed with rate μ • M/M/∞ system
Broadcast flooding (cont.) • Hard state protocol • client explicitly contacts the server upon arrival and departure • server tracks the individual status of each clients to decide when to broadcast • Soft state protocol • in each time interval T, clients contact the server to continue the broadcast in the next interval • the server can inform other clients by piggybacking the information within the broadcast
Broadcast flooding (cont.) • Use scalable polling operation to reduce control massages • Hard state protocol • Choosing leader and only maintain the state of the leader • Soft state protocol • To determine if any clients interested in the current data
Broadcast flooding (cont.) • scalable polling operation • Each client is assigned a n-bit unique sequence • rounds numbered 0 to k • specify a m-bit quantity, m = ks < log n • in the i-th round, a client whose unique bit sequence match along the first (m-ik) bits of the sender specified quantity transmits a message • if any client transmits a message in round i, no further rounds are needed
Broadcast flooding (cont.) • q is the probability that arbitrarily chosen receiver transmits on the i-th round when there are n receivers • Summing over all n receivers over all rounds get N(n, k, s) which is it traffic • soft state protocol traffic rate is • hard state protocol traffic rate is
Conclusion • Soft state maintain an acceptable level of performance across a much wider range of network conditions than is maintained by their hard state counterparts