intentional networking: opportunistic exploitation of mobile network diversity

32
Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason Flinn Brian Noble

Upload: gezana

Post on 06-Jan-2016

30 views

Category:

Documents


0 download

DESCRIPTION

Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity. T.J. Giuli David Watson. Brett Higgins Azarias Reda Timur Alperovich Jason Flinn Brian Noble. The Challenge. Diversity of networks Diversity of behavior. Email Fetch messages. YouTube - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Intentional Networking: Opportunistic Exploitation of

Mobile Network Diversity

T.J. GiuliDavid Watson

Brett HigginsAzarias Reda Timur Alperovich

Jason Flinn Brian Noble

Page 2: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 2

Diversity of networks

Diversity of behavior

Email• Fetch messages

The Challenge

YouTube•Upload video

Match traffic to available networks

Page 3: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 3

Current approaches: two extremes

All details hidden All details exposed

Result: mismatched Result: hard for traffic applications

Please insert

packets

Page 4: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 4

Solution

• System measures available networks

• Applications describe their traffic

• System matches traffic to networks

Page 5: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 5

• Separate concerns• System monitors and measures available networks• Apps describe their traffic• System matches traffic to the right network

• Be simple• Apps use qualitative labels like FG/BG, small/large

• Embrace concurrency• Consider multiple networks like multiple cores• Abstractions for network concurrency

Intentional Networking

Page 6: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 6

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 7: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 7

Abstraction: Multi-socket

• Socket: logical connection between endpoints

Client Server

Page 8: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 8

Abstraction: Multi-socket

• Multi-socket: virtual connection• Measures performance of each alternative• Encapsulates transient network failure

Client Server

Page 9: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 9

Abstraction: Label

• Qualitative description of network traffic• Size: small (latency) or large (bandwidth)• Interactivity: foreground vs. background

Client Server

Page 10: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 10

Implementing “foreground”

• Foreground traffic takes precedence• Need to keep BG traffic out of the way• Borrow from anticipatory scheduling

Kernel socket buffer

Data buffered in library

BG

FG

≤ 50ms of BG dataIf no FG data,

increase to 1 sec

Page 11: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 11

Abstraction: IROB

• IROB: Isolated Reliable Ordered Bytestream• Guarantees atomic delivery of data chunk• Application specifies data, atomicity boundary

4 3 2 1

IROB 1

Page 12: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 12

Abstraction: Ordering Constraints

• App specifies partial ordering on IROBs• Receiving end enforces delivery order

ServerIROB 1

IROB 3

IROB 2

IROB 2

IROB 3Dep: 2

IROB 1

use_data()

Page 13: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 13

Abstraction: Thunk

• What happens when traffic should be deferred?• Application passes an optional callback + state• Borrows from PL domain

• If no suitable network is available:• Operation will fail with a special code• Callback will be fired when a suitable network appears

• Use case: periodic background messages• Send once, at the right time

Page 14: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 14

Intentional Networking: Abstractions

• Multi-socket: virtual connection

• Label: qualitative message description

• IROB: atomicity and ordering constraints

• Thunk: expose network events to application

Page 15: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 15

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 16: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 16

Applications

• Distributed file system• File reads (foreground) and writes (background)• Reads and writes unordered with respect to each other

• IMAP email + prefetching• User requests (foreground) and prefetches (background)• Add small/large label for responses

• Vehicular sensing• Road condition monitoring (small, foreground)• Vehicle performance trend analysis (large, background)• Use thunks to decide when to send cumulative sensor data

Page 17: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 17

Applications

• Distributed file system• File reads (foreground) and writes (background)• Reads and writes unordered with respect to each other

• IMAP email + prefetching• User requests (foreground) and prefetches (background)• Add small/large label for responses

• Vehicular sensing• Road condition monitoring (small, foreground)• Vehicle performance trend analysis (large, background)• Use thunks to decide when to send cumulative sensor data

Page 18: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 18

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 19: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 19

Evaluation: Methodology

• Gathered network traces in a moving vehicle• Sprint 3G & open WiFi• BW up/down, RTT

• Replayed in lab (trace map

here)

Page 20: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 20

Evaluation: Comparison Strategies

• Generated from the network traces• Idealized migration• Always use best-bandwidth network• Always use best-latency network

• Idealized aggregation• Aggregate bandwidth, minimum latency

• Upper bounds on app-oblivious performance

Page 21: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 21

Evaluation Results: Email

• Trace #2: Ypsilanti, MI

0

10

20

30

40

50

60

70

On-demand fetch time

Best band-widthBest latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

50

100

150

200

250

300

350

400BG fetch time

Tim

e (s

econ

ds)

3%

7x

Page 22: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 22

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-width

Best latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8BG throughput

Thro

ughp

ut (K

B/se

c)

48%

6%

Page 23: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 23

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update timeBest band-width

Best latency

Aggregate

Intentional Networking

Intentional Networking, two-process

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8

BG throughput

Thro

ughp

ut (K

B/se

c)

Page 24: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 24

Summary

• Intentional Networking• Separates concerns between apps and the system

• Applications describe their network traffic• System matches traffic to the right network

• Simplifies app task with qualitative labels• Provides abstractions for network concurrency• Outperforms all application-oblivious strategies

• Questions?

Page 25: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 25

Page 26: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 26

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

Single-process Multi-process

Urgent Update Latency Background Throughput

Single-process Multi-process0

2

4

6

8

10

12

Tim

e (s

econ

ds)

0

2

4

6

8

10

12

Best band-widthBest latency

Aggregate

Intentional Networking

0

1

2

3

4

5

6

7

8

Thro

ughp

ut (K

B/se

c)0

1

2

3

4

5

6

7

8

Page 27: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 27

Evaluation Results: Email

• Benchmark• User opens 5 emails (foreground)• App prefetches 100 emails (background)

• We report:• Average on-demand fetch time• Time to finish prefetching all 100 emails

Page 28: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 28

Evaluation Results: Email

• Trace #1: Ann Arbor, MI

0

10

20

30

40

50

60

On-demand fetch time

Best band-widthBest latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

50

100

150

200

250

300

350

BG fetch time

Tim

e (s

econ

ds)

1%

11x

Page 29: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 29

Evaluation Results: Vehicular Sensing

• Trace #1: Ann Arbor, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-widthBest latencyAggregateIntentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

BG throughput

Thro

ughp

ut (K

B/se

c)

1%

4x

Page 30: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 30

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-widthBest latencyAggregateIntentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8

BG throughput

Thro

ughp

ut (K

B/se

c)

6%

2x

Page 31: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 31

Evaluation Results: Multiple Processes

• Trace #1: Ann Arbor, MI

0

1

2

3

4

5

6

7

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

Best band-widthBest latency

Aggregate

Intentional Networking

Single-process Multi-process

Urgent Update Latency

0

1

2

3

4

5

6

7

Thro

ughp

ut (K

B/se

c)

Background Throughput

Single-process Multi-process

0

1

2

3

4

5

6

7

Page 32: Intentional Networking: Opportunistic Exploitation of  Mobile Network Diversity

Brett Higgins 32

Vehicular Sensing

• Based on Ford research platform specs• Raw sensor data sent to central server• About 25KB/sec of data• Useful for long-term analysis, preventative maintenance

• Some sensor readings indicate abnormal conditions• Traction control engaging => slippery roads• Send these reports to service to alert other drivers