SlideShare a Scribd company logo
1 of 43
Theoretical Foundation for Valiant
    Load Balancing and Traffic
        Oblivious Routing

                                          侯宗成, Oct. 13th, 2011



• A. Greenberg et al., “VL2: A Scalable and Flexible Data Center Network”, ACM
  SIGCOMM 2009.
• M. Kodialam, T. V. Kakshman, S. Sengupta, “Efficient and Robust Routing of Highly
  Variable Traffic”, HotHets, 2004.
• James Roberts, “Public Reviews of Papers Appearing at HotNets-III”, ”, HotHets,
  2004.
Outline
• Valiant Load Balancing in VL2

• Background

• Proposed Routing Scheme

• Further Ideas
Outline
• Valiant Load Balancing in VL2
  – Goals and Building Blocks of VL2
  – Spreading for Uniform High Capacity
  – Randomization for Volatility
  – References of VLB
• Background
• Proposed Routing Scheme
• Further Ideas
Goals and Building Blocks of VL2
• Current designs prevent agility
  – Poor server-server capacity: Oversubscription
  – Poor utilization: Fragmentation of resources
  – Poor reliability: Routing & computing
    deadlocks
• Goals: Scalable, flexible, and agile DC
  – Uniform High Capacity
  – Performance Isolation
  – Layer-2 Semantics
Goals and Building Blocks of VL2
• Supporting Infrastructure
  – Directory System / Address Mapping
• Key Innovation
  – Application and Location Addresses
• Major Application of an Innovation
  – VLB and ECMP
• Infrastructure
  – Clos Topology
Goals and Building Blocks of VL2
Supporting


 Innovation


Application


Infrastructure


                 Building Blocks   Goals
Spreading for Uniform High Capacity
• ECMP: among equal paths for a node
• VLB: among nodes for entire network
• Implement VLB by spreading traffic to
  bounce off several core switches
• Hot-spot free: encapsulation and anycast
  address of core switches
• No centralized engineering
  – Seemingly contradictory to OpenFlow
  – Discuss in further ideas
Randomization for Volatility
•   Destination-independent traffic spreading
•   Randomly-chosen intermediate switches
•   Traffic spreading ratios are uniform
•   Edge constraints hold
    – theoretical model provide later
• Shim layer agent: enables path control by
  adjusting randomization
• Claims no problem when elephant flows
  occur: where OpenFlow can work on
References of VLB
• Specific example, VLB:
   – R. Zhang-Shen and N. McKeown “Designing a Predictable
     Internet Backbone Network”, HotNets-III, November 2004.
• General Case, Traffic Oblivious Routing:
   – M. Kodialam, T.V. Lakshman, S Sengupta, “Efficient and Robust
     Routing of Highly Variable Traffic," HotNets, 2004.
• Both met at Stanford Workshop on Load-Balancing, May
  2004.
• R. Zhang-Shen: student of McKeown(Ph.D.) and
  Roxford (post-doc), now at Google.
• Sengupta: one of the authors of VL2, now at Microsoft
  Research
• Early works by: Valiant, for processor interconnection
  networks, 1981.
Outline
• Valiant Load Balancing in VL2
• Background
  – Original Motivation in 2004
  – Traditional Approach
  – Multi-Commodity Flow Problem
  – Preferred Routing Characteristics
  – Similarities with Data Center Network
• Proposed Routing Scheme
• Further Ideas
Original Motivation in 2004
• For Internet Backbone, ISP, VPN services,
  and Autonomous Systems.
• Also applicable to any scenarios:
  – Extreme traffic variations
  – Traffic matrix unknown and no pattern
• Didn’t think of applying to DCN.
• Found to be so ideal for DCN in VL2.
Traditional approach
• Assume we know matrix of demands of
  pairs of ingress/egress routers
• Network design can be formulated as a
  multi-commodity flow problem
• Routing and capacity be selected to:
  – optimize objective functions
  – while satisfying constraints.
• For example: IP shortest path routing
  – implies that demands are over a single path
    satisfying least hops or delay.
Multi-Commodity Flow Problem
Multi-Commodity Flow Problem
Traditional approach
Preferred Routing Characteristics
• Can handle unpredictable traffic and
  maintains good service

• Minimize overprovisioning

• Mostly static routing, without dynamic
  adjustments and complex mechanisms
Similarities with Data Center Network
• Traffic unpredictable and variant

• Mostly static routing can release workload

• Bandwidth on links are critical resources

• DCN core works similarly as backbone
  network
Outline
• Valiant Load Balancing in VL2
• Background
• Proposed Routing Scheme
  – Briefing
  – Modeling Traffic Variability
  – Traffic Oblivious Routing
  – Capacity Effectiveness
  – Key Knowledge Gained
• Further Ideas
Briefing
• View Internet backbone as fully meshed
• N nodes with inter-node links by tunneling
• Traffic Ti-j is routed through an intermediate
  k: tunnel i→k→j
• Traffic split over all possible two-hop
  routes
• Including i→i→j and i→j→j
Briefing
• Can be performed at flow level by a hash
  function or by resequencing packets
• Tunnels need to be sized to accommodate
  all possible traffic matrices
• The only constraint: an upper bound on
  the total amount of incoming and outgoing
  capacity at each node.
Modeling Traffic Variability
Modeling Traffic Variability
Modeling Traffic Variability
Modeling Traffic Variability
Modeling Traffic Variability




A very tough condition, all nodes are at Ri Ci full capacity.
Modeling Traffic Variability
Modeling Traffic Variability




• A very tough condition, all nodes are at Ri Ci full capacity.
• It we can route any matrix in T(R,C), we can route any
  other matrices with smaller column and row sums.
• Can route any demands with nodes less than full capacity.
Traffic Oblivious Routing
Traffic Oblivious Routing
Traffic Oblivious Routing
• Implementing this scheme by:
  – Forming fixed bandwidth tunnels between
    nodes.
  – Refer as Phase 1 and Phase 2 tunnels.
• Bandwidth required for tunnels only
  depends on R and C values.
• Not on the unknown individual entries in
  the varying traffic matrix.
• Modeling tunnel demand next slide.
Traffic Oblivious Routing
Traffic Oblivious Routing
• Property 1: Routing oblivious to traffic
  variations.

• Property 2: Provisioned capacity is traffic
  matric independent.

• Property 3: Complete utilization of
  provisioned capacity.
Traffic Oblivious Routing
• Does not make any assumptions about T,
  apart from row and column sum bounds.
• Does not require the network to detect
  changes in traffic.
• Handles variability in the traffic matrix set
  by effectively routing a transformed matrix.
• Depends only on row/column sum bounds
  and traffic distribution ratios.
• Not on a specific matrix.
Traffic Oblivious Routing
Traffic Oblivious Routing
                Minimize link capacities

                Flow conservation



                Demand satisfaction


                Within hardware capacity

                Distribution ratios
Capacity Effectiveness
• Results with no details in the paper.
• Consider a 20-node and 33 bidirectional
  links network. (represent US backbone)
• Ri’s and Ci’s are equal and normalized to 1.
• Node capacities are identical, equals uR.
• Below uR, routing infeasible.
• Lowest uR =2.595
• uR =2.8, bandwidth efficiency 94%.
Key Knowledge Gained
• Violating edge constraints: roots of all
  network deadlocks in DCN.
• Edge and network problems can be
  separated.
• Edge: how to ensure capacity constraints
  are not violated?
• Network: how to balance loads and
  separate services?
Outline
•   Valiant Load Balancing in VL2
•   Background
•   Proposed Routing Scheme
•   Further Ideas
    – Clos Topology
    – Traffic-Oblivious, Randomized, Load-
      Balanced routing
    – Randomization v.s. Dictation
    – Questions: Combining OpenFlow ?
Further Ideas
Further Ideas
• Traffic-Oblivious Routing
  – Localized routing to switches
• centralized / distributed split ratios
  computation
  – Need further research
• OpenFlow Controllers and Switches
  – Good for planning elephant flows
  – Should be combined with traffic oblivious and
    randomized distributed routing
  – Randomization vs Dictation: Seemingly
    Contradictory
How to adopt both concepts and implement
            into one scheme?
• Depending on flow types and scenarios.
                                When switches are
                                able to do the routines,

                                only leave important
                                and critical tasks to
                                controllers,




• Prevent edges from being overflowed.
  – Design and placement of tenants and hosts.
  – Policies of edge switches, soft or hard.
When do systems initiate dictation /
              randomization?
• For major controllers
  – When critical tasks or situations occur.
  – What are critical tasks?
• For switches / secondary controllers
  – Reconfigure distribution ratios when
    environment changes.
  – How to reconfigure?
• Logical topology / link capacities changed
  – Then switches start to reconfigure.
  – Define logical change?
What are relations between controllers
            and switches?
• Controllers plan resources allocation and
  routing when elephant flows or critical
  situations occur.
• Switches utilize resources left by
  controllers and perform optimization for
  distribution remaining traffic.
• Balance load between controllers and
  switches.

More Related Content

What's hot

The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)Hamdamboy (함담보이)
 
Cours réseaux chap3et4
Cours réseaux chap3et4Cours réseaux chap3et4
Cours réseaux chap3et4Amel Morchdi
 
Networking - UTP and STP Cable - Straight and Crossover - By Mark John Lado
Networking - UTP and STP Cable - Straight and Crossover - By Mark John LadoNetworking - UTP and STP Cable - Straight and Crossover - By Mark John Lado
Networking - UTP and STP Cable - Straight and Crossover - By Mark John LadoMark John Lado, MIT
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab FileNitin Bhasin
 
Short channel effect on FET
Short channel effect on FETShort channel effect on FET
Short channel effect on FETMahsa Farqarazi
 
Tiny os
Tiny osTiny os
Tiny osAcad
 
An intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolAn intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolIftach Ian Amit
 
Performance assessment of the MASQUE extension for proxying scenarios in the ...
Performance assessment of the MASQUE extension for proxying scenarios in the ...Performance assessment of the MASQUE extension for proxying scenarios in the ...
Performance assessment of the MASQUE extension for proxying scenarios in the ...AlessandroNuzzi1
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
The Tofu Interconnect D for the Post K Supercomputer
The Tofu Interconnect D for the Post K SupercomputerThe Tofu Interconnect D for the Post K Supercomputer
The Tofu Interconnect D for the Post K Supercomputerinside-BigData.com
 

What's hot (20)

The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Tensor Processing Unit (TPU)
Tensor Processing Unit (TPU)Tensor Processing Unit (TPU)
Tensor Processing Unit (TPU)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Cours réseaux chap3et4
Cours réseaux chap3et4Cours réseaux chap3et4
Cours réseaux chap3et4
 
Networking - UTP and STP Cable - Straight and Crossover - By Mark John Lado
Networking - UTP and STP Cable - Straight and Crossover - By Mark John LadoNetworking - UTP and STP Cable - Straight and Crossover - By Mark John Lado
Networking - UTP and STP Cable - Straight and Crossover - By Mark John Lado
 
Is is
Is isIs is
Is is
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 
Short channel effect on FET
Short channel effect on FETShort channel effect on FET
Short channel effect on FET
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Tiny os
Tiny osTiny os
Tiny os
 
An intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolAn intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocol
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
Performance assessment of the MASQUE extension for proxying scenarios in the ...
Performance assessment of the MASQUE extension for proxying scenarios in the ...Performance assessment of the MASQUE extension for proxying scenarios in the ...
Performance assessment of the MASQUE extension for proxying scenarios in the ...
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
The Tofu Interconnect D for the Post K Supercomputer
The Tofu Interconnect D for the Post K SupercomputerThe Tofu Interconnect D for the Post K Supercomputer
The Tofu Interconnect D for the Post K Supercomputer
 

Viewers also liked

Presentation11
Presentation11Presentation11
Presentation11KellyCheah
 
Wireless sensor open flow
Wireless sensor open flowWireless sensor open flow
Wireless sensor open flowKellyCheah
 
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...Jason TC HOU (侯宗成)
 
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATIONSDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATIONOpen Networking Summits
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight Mark Hinkle
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Jason TC HOU (侯宗成)
 
DevoFlow - Scaling Flow Management for High-Performance Networks
DevoFlow - Scaling Flow Management for High-Performance NetworksDevoFlow - Scaling Flow Management for High-Performance Networks
DevoFlow - Scaling Flow Management for High-Performance NetworksJason TC HOU (侯宗成)
 
ONS content extraction
ONS content extractionONS content extraction
ONS content extractionKellyCheah
 
presentationGAATT
presentationGAATTpresentationGAATT
presentationGAATTKellyCheah
 
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...Open Networking Summits
 
Implementing SDN Testbed(ONOS & OpenVirteX)
Implementing SDN Testbed(ONOS & OpenVirteX)Implementing SDN Testbed(ONOS & OpenVirteX)
Implementing SDN Testbed(ONOS & OpenVirteX)sangyun han
 
Spreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesSpreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesOpen Networking Summits
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersRadisys Corporation
 
Onos overview meetup sdn paris - redux
Onos overview  meetup sdn paris - reduxOnos overview  meetup sdn paris - redux
Onos overview meetup sdn paris - reduxSDN_Paris
 
Summit 16: Open-O Mini-Summit - Open Source Evolution for Carriers
Summit 16: Open-O Mini-Summit - Open Source Evolution for CarriersSummit 16: Open-O Mini-Summit - Open Source Evolution for Carriers
Summit 16: Open-O Mini-Summit - Open Source Evolution for CarriersOPNFV
 
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-OSummit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-OOPNFV
 

Viewers also liked (20)

User-Defined Network Cloud
User-Defined Network CloudUser-Defined Network Cloud
User-Defined Network Cloud
 
Presentation11
Presentation11Presentation11
Presentation11
 
Wireless sensor open flow
Wireless sensor open flowWireless sensor open flow
Wireless sensor open flow
 
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...
Hedera - Dynamic Flow Scheduling for Data Center Networks, an Application of ...
 
Data Center Network Multipathing
Data Center Network MultipathingData Center Network Multipathing
Data Center Network Multipathing
 
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATIONSDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
SDN & OPTICAL FLOW STEERING FOR NETWORK FUNCTION VIRTUALIZATION
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012
 
Presentation1
Presentation1Presentation1
Presentation1
 
DevoFlow - Scaling Flow Management for High-Performance Networks
DevoFlow - Scaling Flow Management for High-Performance NetworksDevoFlow - Scaling Flow Management for High-Performance Networks
DevoFlow - Scaling Flow Management for High-Performance Networks
 
App 的隱形殺手 - 留存率
App 的隱形殺手 - 留存率App 的隱形殺手 - 留存率
App 的隱形殺手 - 留存率
 
ONS content extraction
ONS content extractionONS content extraction
ONS content extraction
 
presentationGAATT
presentationGAATTpresentationGAATT
presentationGAATT
 
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
OPNFV Webinar – No Time to Wait: Accelerating NFV Time to Market Through Open...
 
Implementing SDN Testbed(ONOS & OpenVirteX)
Implementing SDN Testbed(ONOS & OpenVirteX)Implementing SDN Testbed(ONOS & OpenVirteX)
Implementing SDN Testbed(ONOS & OpenVirteX)
 
Spreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use casesSpreading NFV through the Network: the ETSI NFV use cases
Spreading NFV through the Network: the ETSI NFV use cases
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
 
Onos overview meetup sdn paris - redux
Onos overview  meetup sdn paris - reduxOnos overview  meetup sdn paris - redux
Onos overview meetup sdn paris - redux
 
Summit 16: Open-O Mini-Summit - Open Source Evolution for Carriers
Summit 16: Open-O Mini-Summit - Open Source Evolution for CarriersSummit 16: Open-O Mini-Summit - Open Source Evolution for Carriers
Summit 16: Open-O Mini-Summit - Open Source Evolution for Carriers
 
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-OSummit 16: Open-O Mini-Summit - OPNFV & Open-O
Summit 16: Open-O Mini-Summit - OPNFV & Open-O
 

Similar to Valiant Load Balancing and Traffic Oblivious Routing

FATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureFATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureAnkita Mahajan
 
CellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksCellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksOpen Networking Summits
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithmRoshan Karunarathna
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptMekiPetitSeg
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptSmitNiks
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptssuser2cc0d4
 
Routing in Ad hoc networks
Routing in Ad hoc networksRouting in Ad hoc networks
Routing in Ad hoc networksTran Thang
 
24-ad-hoc.ppt
24-ad-hoc.ppt24-ad-hoc.ppt
24-ad-hoc.pptsumadi26
 
Rapid Survey on Routing in Data Centers
Rapid Survey on Routing in Data CentersRapid Survey on Routing in Data Centers
Rapid Survey on Routing in Data CentersGhazal Tashakor
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxBinyamBekeleMoges
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureGunawan Jusuf
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.pptVimalMallick
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.pptPatrick Theuri
 

Similar to Valiant Load Balancing and Traffic Oblivious Routing (20)

FATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureFATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network Architecture
 
CellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksCellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networks
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
Routing in Ad hoc networks
Routing in Ad hoc networksRouting in Ad hoc networks
Routing in Ad hoc networks
 
24-ad-hoc.ppt
24-ad-hoc.ppt24-ad-hoc.ppt
24-ad-hoc.ppt
 
Network layer
Network layerNetwork layer
Network layer
 
Rapid Survey on Routing in Data Centers
Rapid Survey on Routing in Data CentersRapid Survey on Routing in Data Centers
Rapid Survey on Routing in Data Centers
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Lan overview
Lan overviewLan overview
Lan overview
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network Architecture
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
lect10_interconnect.ppt
lect10_interconnect.pptlect10_interconnect.ppt
lect10_interconnect.ppt
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 

More from Jason TC HOU (侯宗成)

More from Jason TC HOU (侯宗成) (9)

A Data Culture in Daily Work - Examples @ KKTV
A Data Culture in Daily Work - Examples @ KKTVA Data Culture in Daily Work - Examples @ KKTV
A Data Culture in Daily Work - Examples @ KKTV
 
Triangulating Data to Drive Growth
Triangulating Data to Drive GrowthTriangulating Data to Drive Growth
Triangulating Data to Drive Growth
 
Design & Growth @ KKTV - uP!ck Sharing
Design & Growth @ KKTV - uP!ck SharingDesign & Growth @ KKTV - uP!ck Sharing
Design & Growth @ KKTV - uP!ck Sharing
 
文武雙全的產品設計 DESIGNING WITH DATA
文武雙全的產品設計 DESIGNING WITH DATA文武雙全的產品設計 DESIGNING WITH DATA
文武雙全的產品設計 DESIGNING WITH DATA
 
Growth @ KKTV
Growth @ KKTVGrowth @ KKTV
Growth @ KKTV
 
Growth 的基石 用戶行為追蹤
Growth 的基石   用戶行為追蹤Growth 的基石   用戶行為追蹤
Growth 的基石 用戶行為追蹤
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 
OpenStack Framework Introduction
OpenStack Framework IntroductionOpenStack Framework Introduction
OpenStack Framework Introduction
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Valiant Load Balancing and Traffic Oblivious Routing

  • 1. Theoretical Foundation for Valiant Load Balancing and Traffic Oblivious Routing 侯宗成, Oct. 13th, 2011 • A. Greenberg et al., “VL2: A Scalable and Flexible Data Center Network”, ACM SIGCOMM 2009. • M. Kodialam, T. V. Kakshman, S. Sengupta, “Efficient and Robust Routing of Highly Variable Traffic”, HotHets, 2004. • James Roberts, “Public Reviews of Papers Appearing at HotNets-III”, ”, HotHets, 2004.
  • 2. Outline • Valiant Load Balancing in VL2 • Background • Proposed Routing Scheme • Further Ideas
  • 3. Outline • Valiant Load Balancing in VL2 – Goals and Building Blocks of VL2 – Spreading for Uniform High Capacity – Randomization for Volatility – References of VLB • Background • Proposed Routing Scheme • Further Ideas
  • 4. Goals and Building Blocks of VL2 • Current designs prevent agility – Poor server-server capacity: Oversubscription – Poor utilization: Fragmentation of resources – Poor reliability: Routing & computing deadlocks • Goals: Scalable, flexible, and agile DC – Uniform High Capacity – Performance Isolation – Layer-2 Semantics
  • 5. Goals and Building Blocks of VL2 • Supporting Infrastructure – Directory System / Address Mapping • Key Innovation – Application and Location Addresses • Major Application of an Innovation – VLB and ECMP • Infrastructure – Clos Topology
  • 6. Goals and Building Blocks of VL2 Supporting Innovation Application Infrastructure Building Blocks Goals
  • 7. Spreading for Uniform High Capacity • ECMP: among equal paths for a node • VLB: among nodes for entire network • Implement VLB by spreading traffic to bounce off several core switches • Hot-spot free: encapsulation and anycast address of core switches • No centralized engineering – Seemingly contradictory to OpenFlow – Discuss in further ideas
  • 8. Randomization for Volatility • Destination-independent traffic spreading • Randomly-chosen intermediate switches • Traffic spreading ratios are uniform • Edge constraints hold – theoretical model provide later • Shim layer agent: enables path control by adjusting randomization • Claims no problem when elephant flows occur: where OpenFlow can work on
  • 9. References of VLB • Specific example, VLB: – R. Zhang-Shen and N. McKeown “Designing a Predictable Internet Backbone Network”, HotNets-III, November 2004. • General Case, Traffic Oblivious Routing: – M. Kodialam, T.V. Lakshman, S Sengupta, “Efficient and Robust Routing of Highly Variable Traffic," HotNets, 2004. • Both met at Stanford Workshop on Load-Balancing, May 2004. • R. Zhang-Shen: student of McKeown(Ph.D.) and Roxford (post-doc), now at Google. • Sengupta: one of the authors of VL2, now at Microsoft Research • Early works by: Valiant, for processor interconnection networks, 1981.
  • 10. Outline • Valiant Load Balancing in VL2 • Background – Original Motivation in 2004 – Traditional Approach – Multi-Commodity Flow Problem – Preferred Routing Characteristics – Similarities with Data Center Network • Proposed Routing Scheme • Further Ideas
  • 11. Original Motivation in 2004 • For Internet Backbone, ISP, VPN services, and Autonomous Systems. • Also applicable to any scenarios: – Extreme traffic variations – Traffic matrix unknown and no pattern • Didn’t think of applying to DCN. • Found to be so ideal for DCN in VL2.
  • 12. Traditional approach • Assume we know matrix of demands of pairs of ingress/egress routers • Network design can be formulated as a multi-commodity flow problem • Routing and capacity be selected to: – optimize objective functions – while satisfying constraints. • For example: IP shortest path routing – implies that demands are over a single path satisfying least hops or delay.
  • 16. Preferred Routing Characteristics • Can handle unpredictable traffic and maintains good service • Minimize overprovisioning • Mostly static routing, without dynamic adjustments and complex mechanisms
  • 17. Similarities with Data Center Network • Traffic unpredictable and variant • Mostly static routing can release workload • Bandwidth on links are critical resources • DCN core works similarly as backbone network
  • 18. Outline • Valiant Load Balancing in VL2 • Background • Proposed Routing Scheme – Briefing – Modeling Traffic Variability – Traffic Oblivious Routing – Capacity Effectiveness – Key Knowledge Gained • Further Ideas
  • 19. Briefing • View Internet backbone as fully meshed • N nodes with inter-node links by tunneling • Traffic Ti-j is routed through an intermediate k: tunnel i→k→j • Traffic split over all possible two-hop routes • Including i→i→j and i→j→j
  • 20. Briefing • Can be performed at flow level by a hash function or by resequencing packets • Tunnels need to be sized to accommodate all possible traffic matrices • The only constraint: an upper bound on the total amount of incoming and outgoing capacity at each node.
  • 25. Modeling Traffic Variability A very tough condition, all nodes are at Ri Ci full capacity.
  • 27. Modeling Traffic Variability • A very tough condition, all nodes are at Ri Ci full capacity. • It we can route any matrix in T(R,C), we can route any other matrices with smaller column and row sums. • Can route any demands with nodes less than full capacity.
  • 30. Traffic Oblivious Routing • Implementing this scheme by: – Forming fixed bandwidth tunnels between nodes. – Refer as Phase 1 and Phase 2 tunnels. • Bandwidth required for tunnels only depends on R and C values. • Not on the unknown individual entries in the varying traffic matrix. • Modeling tunnel demand next slide.
  • 32. Traffic Oblivious Routing • Property 1: Routing oblivious to traffic variations. • Property 2: Provisioned capacity is traffic matric independent. • Property 3: Complete utilization of provisioned capacity.
  • 33. Traffic Oblivious Routing • Does not make any assumptions about T, apart from row and column sum bounds. • Does not require the network to detect changes in traffic. • Handles variability in the traffic matrix set by effectively routing a transformed matrix. • Depends only on row/column sum bounds and traffic distribution ratios. • Not on a specific matrix.
  • 35. Traffic Oblivious Routing Minimize link capacities Flow conservation Demand satisfaction Within hardware capacity Distribution ratios
  • 36. Capacity Effectiveness • Results with no details in the paper. • Consider a 20-node and 33 bidirectional links network. (represent US backbone) • Ri’s and Ci’s are equal and normalized to 1. • Node capacities are identical, equals uR. • Below uR, routing infeasible. • Lowest uR =2.595 • uR =2.8, bandwidth efficiency 94%.
  • 37. Key Knowledge Gained • Violating edge constraints: roots of all network deadlocks in DCN. • Edge and network problems can be separated. • Edge: how to ensure capacity constraints are not violated? • Network: how to balance loads and separate services?
  • 38. Outline • Valiant Load Balancing in VL2 • Background • Proposed Routing Scheme • Further Ideas – Clos Topology – Traffic-Oblivious, Randomized, Load- Balanced routing – Randomization v.s. Dictation – Questions: Combining OpenFlow ?
  • 40. Further Ideas • Traffic-Oblivious Routing – Localized routing to switches • centralized / distributed split ratios computation – Need further research • OpenFlow Controllers and Switches – Good for planning elephant flows – Should be combined with traffic oblivious and randomized distributed routing – Randomization vs Dictation: Seemingly Contradictory
  • 41. How to adopt both concepts and implement into one scheme? • Depending on flow types and scenarios. When switches are able to do the routines, only leave important and critical tasks to controllers, • Prevent edges from being overflowed. – Design and placement of tenants and hosts. – Policies of edge switches, soft or hard.
  • 42. When do systems initiate dictation / randomization? • For major controllers – When critical tasks or situations occur. – What are critical tasks? • For switches / secondary controllers – Reconfigure distribution ratios when environment changes. – How to reconfigure? • Logical topology / link capacities changed – Then switches start to reconfigure. – Define logical change?
  • 43. What are relations between controllers and switches? • Controllers plan resources allocation and routing when elephant flows or critical situations occur. • Switches utilize resources left by controllers and perform optimization for distribution remaining traffic. • Balance load between controllers and switches.