intentional networking: opportunistic exploitation of mobile network diversity t.j. giuli david...

32
Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason Flinn Brian Noble

Upload: lorenzo-varvel

Post on 31-Mar-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Intentional Networking: Opportunistic Exploitation of

Mobile Network Diversity

T.J. GiuliDavid Watson

Brett HigginsAzarias Reda Timur Alperovich

Jason Flinn Brian Noble

Page 2: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 2

Diversity of networks

Diversity of behavior

Email• Fetch messages

The Challenge

YouTube•Upload video

Match traffic to available networks

Page 3: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 3

Current approaches: two extremes

All details hidden All details exposed

Result: mismatched Result: hard for traffic applications

Please insert

packets

Page 4: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 4

Solution

• System measures available networks

• Applications describe their traffic

• System matches traffic to networks

Page 5: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 5

• Separate concerns• System monitors and measures available networks• Apps describe their traffic• System matches traffic to the right network

• Be simple• Apps use qualitative labels like FG/BG, small/large

• Embrace concurrency• Consider multiple networks like multiple cores• Abstractions for network concurrency

Intentional Networking

Page 6: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 6

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 7: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 7

Abstraction: Multi-socket

• Socket: logical connection between endpoints

Client Server

Page 8: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 8

Abstraction: Multi-socket

• Multi-socket: virtual connection• Measures performance of each alternative• Encapsulates transient network failure

Client Server

Page 9: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 9

Abstraction: Label

• Qualitative description of network traffic• Size: small (latency) or large (bandwidth)• Interactivity: foreground vs. background

Client Server

Page 10: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 10

Implementing “foreground”

• Foreground traffic takes precedence• Need to keep BG traffic out of the way• Borrow from anticipatory scheduling

Kernel socket buffer

Data buffered in library

BG

FG

≤ 50ms of BG dataIf no FG data,

increase to 1 sec

Page 11: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 11

Abstraction: IROB

• IROB: Isolated Reliable Ordered Bytestream• Guarantees atomic delivery of data chunk• Application specifies data, atomicity boundary

4 3 2 1

IROB 1

Page 12: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 12

Abstraction: Ordering Constraints

• App specifies partial ordering on IROBs• Receiving end enforces delivery order

ServerIROB 1

IROB 3

IROB 2

IROB 2

IROB 3Dep: 2

IROB 1

use_data()

Page 13: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 13

Abstraction: Thunk

• What happens when traffic should be deferred?• Application passes an optional callback + state• Borrows from PL domain

• If no suitable network is available:• Operation will fail with a special code• Callback will be fired when a suitable network appears

• Use case: periodic background messages• Send once, at the right time

Page 14: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 14

Intentional Networking: Abstractions

• Multi-socket: virtual connection

• Label: qualitative message description

• IROB: atomicity and ordering constraints

• Thunk: expose network events to application

Page 15: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 15

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 16: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 16

Applications

• Distributed file system• File reads (foreground) and writes (background)• Reads and writes unordered with respect to each other

• IMAP email + prefetching• User requests (foreground) and prefetches (background)• Add small/large label for responses

• Vehicular sensing• Road condition monitoring (small, foreground)• Vehicle performance trend analysis (large, background)• Use thunks to decide when to send cumulative sensor data

Page 17: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 17

Applications

• Distributed file system• File reads (foreground) and writes (background)• Reads and writes unordered with respect to each other

• IMAP email + prefetching• User requests (foreground) and prefetches (background)• Add small/large label for responses

• Vehicular sensing• Road condition monitoring (small, foreground)• Vehicle performance trend analysis (large, background)• Use thunks to decide when to send cumulative sensor data

Page 18: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 18

Roadmap

• Motivation• Abstractions• Applications• Evaluation• Summary

Page 19: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 19

Evaluation: Methodology

• Gathered network traces in a moving vehicle• Sprint 3G & open WiFi• BW up/down, RTT

• Replayed in lab (trace map

here)

Page 20: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 20

Evaluation: Comparison Strategies

• Generated from the network traces• Idealized migration• Always use best-bandwidth network• Always use best-latency network

• Idealized aggregation• Aggregate bandwidth, minimum latency

• Upper bounds on app-oblivious performance

Page 21: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 21

Evaluation Results: Email

• Trace #2: Ypsilanti, MI

0

10

20

30

40

50

60

70

On-demand fetch time

Best band-widthBest latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

50

100

150

200

250

300

350

400BG fetch time

Tim

e (s

econ

ds)

3%

7x

Page 22: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 22

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-width

Best latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8BG throughput

Thro

ughp

ut (K

B/se

c)

48%

6%

Page 23: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 23

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update timeBest band-width

Best latency

Aggregate

Intentional Networking

Intentional Networking, two-process

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8

BG throughput

Thro

ughp

ut (K

B/se

c)

Page 24: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 24

Summary

• Intentional Networking• Separates concerns between apps and the system

• Applications describe their network traffic• System matches traffic to the right network

• Simplifies app task with qualitative labels• Provides abstractions for network concurrency• Outperforms all application-oblivious strategies

• Questions?

Page 25: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 25

Page 26: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 26

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

Single-process Multi-process

Urgent Update Latency Background Throughput

Single-process Multi-process0

2

4

6

8

10

12

Tim

e (s

econ

ds)

0

2

4

6

8

10

12

Best band-widthBest latency

Aggregate

Intentional Networking

0

1

2

3

4

5

6

7

8

Thro

ughp

ut (K

B/se

c)0

1

2

3

4

5

6

7

8

Page 27: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 27

Evaluation Results: Email

• Benchmark• User opens 5 emails (foreground)• App prefetches 100 emails (background)

• We report:• Average on-demand fetch time• Time to finish prefetching all 100 emails

Page 28: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 28

Evaluation Results: Email

• Trace #1: Ann Arbor, MI

0

10

20

30

40

50

60

On-demand fetch time

Best band-widthBest latency

Aggregate

Intentional Networking

Tim

e (s

econ

ds)

0

50

100

150

200

250

300

350

BG fetch time

Tim

e (s

econ

ds)

1%

11x

Page 29: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 29

Evaluation Results: Vehicular Sensing

• Trace #1: Ann Arbor, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-widthBest latencyAggregateIntentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

BG throughput

Thro

ughp

ut (K

B/se

c)

1%

4x

Page 30: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 30

Evaluation Results: Vehicular Sensing

• Trace #2: Ypsilanti, MI

0

1

2

3

4

5

6

7

Urgent update time

Best band-widthBest latencyAggregateIntentional Networking

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

8

BG throughput

Thro

ughp

ut (K

B/se

c)

6%

2x

Page 31: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 31

Evaluation Results: Multiple Processes

• Trace #1: Ann Arbor, MI

0

1

2

3

4

5

6

7

Tim

e (s

econ

ds)

0

1

2

3

4

5

6

7

Best band-widthBest latency

Aggregate

Intentional Networking

Single-process Multi-process

Urgent Update Latency

0

1

2

3

4

5

6

7

Thro

ughp

ut (K

B/se

c)

Background Throughput

Single-process Multi-process

0

1

2

3

4

5

6

7

Page 32: Intentional Networking: Opportunistic Exploitation of Mobile Network Diversity T.J. Giuli David Watson Brett Higgins Azarias Reda Timur Alperovich Jason

Brett Higgins 32

Vehicular Sensing

• Based on Ford research platform specs• Raw sensor data sent to central server• About 25KB/sec of data• Useful for long-term analysis, preventative maintenance

• Some sensor readings indicate abnormal conditions• Traction control engaging => slippery roads• Send these reports to service to alert other drivers