Memory-Efficient Performance Monitoring on Programmable Switches with Lean Algorithms

被引:0
作者
Liu, Zaoxing [1 ]
Zhou, Samson [1 ]
Rottenstreich, Ori [2 ]
Braverman, Vladimir [3 ]
Rexford, Jennifer [4 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Technion, Haifa, Israel
[3] Johns Hopkins Univ, Baltimore, MD USA
[4] Princeton Univ, Princeton, NJ 08544 USA
来源
SYMPOSIUM ON ALGORITHMIC PRINCIPLES OF COMPUTER SYSTEMS, APOCS | 2020年
关键词
BLOOM FILTER; FREQUENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network performance problems are notoriously difficult to diagnose. Prior profiling systems collect performance statistics by keeping information about each network flow, but maintaining per-flow state is not scalable on resource-constrained NIC and switch hardware. Instead, we propose sketch-based performance monitoring using memory that is sublinear in the number of flows. Existing sketches estimate flow monitoring metrics based on flow sizes. In contrast, performance monitoring typically requires combining information across pairs of packets, such as matching a data packet with its acknowledgment to compute a round-trip time. We define a new class of lean algorithms that use memory sublinear in both the size of input data and the number of flows. We then introduce lean algorithms for a set of important statistics, such as identifying flows with high latency, loss, out-of-order, or retransmitted packets. We implement prototypes of our lean algorithms on a commodity programmable switch using the P4 language. Our experiments show that lean algorithms detect similar to 82% of top 100 problematic flows among real-world packet traces using just 40KB memory.
引用
收藏
页码:31 / 44
页数:14
相关论文
共 53 条
  • [1] Alipourfard O., 2015, P HOTNETS
  • [2] The space complexity of approximating the frequency moments
    Alon, N
    Matias, Y
    Szegedy, M
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1999, 58 (01) : 137 - 147
  • [3] [Anonymous], Cisco IOS NetFlow
  • [4] [Anonymous], Barefoot Tofino
  • [5] Bar-Yossef Z., 2002, Randomization and Approximation Techniques in Computer Science. 6th International Workshop, RANDOM 2002. Proceedings (Lecture Notes in Computer Science Vol.2483), P1
  • [6] Critical path analysis of TCP transactions
    Barford, P
    Crovella, M
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (04) : 127 - 138
  • [7] Constant Time Updates in Hierarchical Heavy Hitters
    Ben Basat, Ran
    Einziger, Gil
    Friedman, Roy
    Luizelli, Marcelo C.
    Waisbard, Erez
    [J]. SIGCOMM '17: PROCEEDINGS OF THE 2017 CONFERENCE OF THE ACM SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2017, : 127 - 140
  • [8] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [9] Programming Protocol-Independent Packet Processors
    Bosshart, Pat
    Daly, Dan
    Gibb, Glen
    Izzard, Martin
    McKeown, Nick
    Rexford, Jennifer
    Schlesinger, Cole
    Talayco, Dan
    Vahdat, Amin
    Varghese, George
    Walker, David
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) : 87 - 95
  • [10] caida, The CAIDA UCSD Anonymized Internet Traces