Active SNMP S. Keshav Cornell University (joint work with R. Sharma
17 Slides70.00 KB
Active SNMP S. Keshav Cornell University (joint work with R. Sharma and M. Wu) OPENSIG Workshop October 6, 1997
Why do we need ambassadors? Telecom revolution Jets
Ambassadors Keep track of local news Can react quickly to local events Summarize and report relevant information Can be “field-upgraded”
Ambassadors and agents Ambassadors – Keep track of local news Agents – Keep track of local routes and multicast information no horizon effect – Can react quickly to local events – Summarize and report relevant information – Can be “field-upgraded” – Can react quickly to local changes in network state – Summarize and report relevant information – Can be upgraded to provide extensible service
Active network Allows computation, in the form of agents, within a network Network can actively manipulate data – filter video layers firewall – transform compress – redirect mobility
Two approaches Active packets – network elements provide runtime environment – extreme Agents in control path – act on passive packets – more likely to succeed – already exists in a rudimentary form (scheduling)
Top-level issues What are agents allowed to do? How do we communicate with them? How do we work with existing infrastructure?
What are agents allowed to do? Effectiveness of an agent depends on – operations it is allowed to perform (execution model) – data it is allowed to see (data model) Data model execution model execution environment Tradeoff between richness of environment, computation cost, and security
How to communicate with them? Isomorphic to the problem of establishing state within networks State is currently established by – signaling – routing – network management Two options – use existing protocols for installing state – new protocol
How to be backward compatible? Subvert an existing protocol Choices – RSVP – OSPF/BGP/RIP – SNMP
SNMP Pros and Cons Cons – clunky (ASN.1, no scoping) – poor security model (communities) Pros – – – – widely available simple extensible well-understood
Active SNMP Execution model Java runtime Data model MIB – exposed as a Java class Snaplets monitor and manipulate MIBs
Where do snaplets run? On the managed object – requires JRE in every managed object – not backward compatible On a proxy ‘close’ to managed object – not quite perfect, but works
Architecture snmplets Get /Set /Get Next Requests Snmplets Manager Active SNMP Proxy SNMPD
Naming and parameter passing Snaplet is embeded in WWW namespace – http://snmp.cs.cornell.edu/snaplets/icmp monitor/ 1/1.0/2/2.45 Snaplet instance is embedded in the MIB – csgate1.cs.cornell.edu:1.3.2.5.6.2.6.1
Some applications Real time control Fine-grained measurement Sophisticated trap generation algorithms Semantic routing – find a path with the most RSVP-compliant routers between a source and a destination.
Discussion Active networks are not a panacea Add complexity, security holes, and overhead But can do some things otherwise impossible Active SNMP is a pragmatic first step Implementation is up and running at Cornell