Offline queries in software defined networks
09736064 · 2017-08-15
Assignee
Inventors
- Hui Zhang (Princeton Junction, NJ)
- Behnaz Arzani (Philadelphia, PA, US)
- Franjo Ivancic (Princeton, NJ)
- Junghwan Rhee (Princeton, NJ)
- Nipun Arora (Plainsboro, NJ)
- Guofei Jiang (Princeton, NJ)
Cpc classification
H04L45/00
ELECTRICITY
H04L43/106
ELECTRICITY
H04L41/40
ELECTRICITY
H04L47/283
ELECTRICITY
H04L41/00
ELECTRICITY
H04L41/145
ELECTRICITY
H04L43/20
ELECTRICITY
International classification
Abstract
Methods and systems for finding a packet's routing path in a network includes intercepting control messages sent by a controller to one or more switches in a software defined network (SDN). A state of the SDN at a requested time is emulated and one or more possible routing paths through the emulated SDN is identified by replaying the intercepted control messages to one or more emulated switches in the emulated SDN. The one or more possible routing paths correspond to a requested packet injected into the SDN at the requested time.
Claims
1. A method for finding a packet's routing path in a network, comprising: intercepting control messages sent by a controller to one or more switches in a software defined network (SDN); emulating a state of the SDN at a requested time; and identifying one or more possible routing paths through the emulated SDN by replaying the intercepted control messages to one or more emulated switches in the emulated SDN, wherein said one or more possible routing paths correspond to a requested packet injected into the SDN at the requested time; and determining a starting time T.sub.s, defined as the time before which switch states will not influence routing decisions for the packet, as T.sub.s=T.sub.0 if, for every control message that is sent to a switch matching the packet and incoming port on the packet fields, the control message has a recorded time stamp T.sub.i that satisfies:
2. A method for finding a packet's routing path in a network, comprising: intercepting control messages sent by a controller to one or more switches in a software defined network (SDN); emulating a state of the SDN at a requested time; and identifying one or more possible routing paths through the emulated SDN by replaying the intercepted control messages to one or more emulated switches in the emulated SDN, wherein said one or more possible routing paths correspond to a requested packet injected into the SDN at the requested time; and wherein identifying one or more possible routing paths comprises reconstructing flow table states of the one or more emulated switches based on the intercepted control messages and round trip time (RTT) information; and wherein intercepted control messages selected for reconstructing the flow table states are all messages earlier than T.sub.x until the first message whose time stamp T.sub.c0 satisfies
3. A system for finding a packet's path in a network, comprising: a proxy comprising a processor and a memory storing an executable program code executed by the processor configured to intercept control messages sent by a controller to one or more switches in a software defined network (SDN); and a network emulator comprising a processor and a memory storing an executable program code executed by the processor configured to emulate a state of the SDN at a requested time and to identify one or more possible routing paths through the emulated SDN by replaying the intercepted control messages to one or more emulated switches in the emulated SDN, wherein said one or more routing possible paths correspond to a requested packet inserted into the SDN at the requested time wherein the network emulator is configured to reconstruct flow table states of the one or more emulated switches based on the intercepted control messages and round trip time (RTT) information; and wherein the network emulator is further configured to determine a starting time T.sub.s, defined as the time before which switch states will not influence routing decisions for the packet, as T.sub.s=T.sub.0 if, for every control message that is sent to a switch matching the packet and incoming port on the packet fields, the control message has a recorded time stamp T.sub.i that satisfies:
4. A system for finding a packet's path in a network, comprising: a proxy comprising a processor and a memory storing an executable program code executed by the processor configured to intercept control messages sent by a controller to one or more switches in a software defined network (SDN); and a network emulator comprising a processor and a memory storing an executable program code executed by the processor configured to emulate a state of the SDN at a requested time and to identify one or more possible routing paths through the emulated SDN by replaying the intercepted control messages to one or more emulated switches in the emulated SDN, wherein said one or more routing possible paths correspond to a requested packet inserted into the SDN at the requested time wherein the network emulator is configured to reconstruct flow table states of the one or more emulated switches based on the intercepted control messages and round trip time (RTT) information; and wherein intercepted control messages selected for reconstructing the flow table states are all messages earlier than T.sub.x until the first message whose time stamp T.sub.c0 satisfies
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
DETAILED DESCRIPTION
(4) Embodiments of the present invention support offline queries on the precise routing paths that data packets take in a forwarding architecture network without instrumentation or tracing in software defined networking (SDN) switches. This includes recording the control messages exchanged between an SDN controller and switches, along with measurements of the network latency between the SDN controller and switches.
(5) Referring now to
(6) Control messages between the switches 102 and 103 and a controller 118, which change flow tables in the switches 102 and 103, are recorded, along with measurements of the network latency between the controller 118 and the switches 102 and 103. To accomplish this, an SDN Shadow block 106 is interposed between the controller 118 and the SDN 100. The primary purpose of the control messages is to add, delete, and modify flow/group entries in the flow tables and to set switch port properties. A proxy 108 intercepts control messages from SDN controller 118 and stores them in control plane logs 110. The control messages can be obtained by using existing tools, such as packet sniffers, or by specialized plugins in the controller software, to create a local copy. The proxy 108 also records the time that each control message is sent, the network latency in round trip time between the controller 118 and the switches 102 and 103. At the beginning of recording, the proxy 108 also logs a snapshot of the flow tables in the switches if they are not empty and logs the SDN network topology information, including switch information, network links between switches, and last-hop links between switches and interested hosts.
(7) To find path information, control message traces are played back in a network emulator upon a precise routing path query for a data packet at a certain time in the recording period in the query engine 114, using information from network topology storage 112. The query engine 114 offers a user interface to take a data packet and time stamp as inputs and runs a the network emulator to replay the selected set of recorded control messages to determine the path the data packet could take if it were injected into the SDN 100 at the time specified. Possible flow table states at the switches in question are reconstructed and the possible routing paths that the data packet in question could take are found at path API 116. Optionally the possibilities assigned to those routing paths are calculated. This information is output in block 120 and may be in the form of an ordered list that encodes the switches traversed, the switch input and output ports, and a matched flow entry.
(8) Accepting the query input in the query engine 114 includes receiving a packet event, defined by the packet, the time, and an input switch. The packet may be in the format of a network packet that includes an Ethernet frame and IP header. Time T specifies the time when the packet entered the SDN network 100. The input switch information is optional and may specify the first switch and port where the packet arrived in the network 100. Contrary to existing path-oriented request tracing solutions, the query engine 114 allows users to input a packet event in the format <packet X, time T, [switch S.sub.0:portIN]> and receive a reply on the precise path information that the network packet could take in the network 100.
(9) Rebuilding the switch flow tables selects a subset of the recorded control messages and creates an emulation of the original SDN network with the recorded network topology information, re-injects the selected set of control messages through an emulated controller to the emulated switches, and then dumps the related flow table entry information from all the emulated switches.
(10) The emulation information is then searched to find which switches and routing rules the packet could pass through, constructing precise routing paths. The path API 116 outputs paths with the format of an ordered list as described above to generate the output 120.
(11) Referring now to
(12) A starting time T.sub.s is determined, defined as the time before which switch states will not influence routing decisions for the packet. If, for every control message that is sent to a switch matching the packet and incoming port on the packet fields, the control message has a recorded time stamp T.sub.i that satisfies:
(13)
where T.sub.s=T.sub.0, where E.sub.RTT is the mean RTT, σ.sub.RTT is the variance on the RTT, T.sub.0 is the input timestamp, and k is the Z-value in the statistical confidence interval. If not, then
(14)
where T.sub.x is the time stamp of the earliest control message matching the packet and violating the above condition.
(15) All recorded control messages sent to the respective initial switch are selected which have time stamps no later than T.sub.s and contain flow table entries matching the packet and incoming port on the packet fields. These control messages are put in a time-ordered list. If there are no such messages, then the switch in question is removed from consideration as an initial switch. If there are no switches having such control messages, then the user is informed that no valid path was found.
(16) Creating the emulated network in block 204 uses the recorded network topology information 112 to form an emulated network having the same topology as the traced SDN network 100.
(17) Reconstructing the flow table in block 206 uses the packet, the input timestamp T.sub.s, and the results of blocks 202 and 204 to reconstruct switch flow table entries that affect the packet's routing decisions. Reconstruction begins with initializing all of the flow tables of all emulated switches with logged snapshots. An emulated controller sends recorded control messages to each emulated switch in time order until the first message is found that goes through without generating an error message and that has a time stamp T.sub.c0 such that
(18)
where T.sub.D is the maximum time a packet can remain in the network and is a function of network diameter. This message and any remaining control messages satisfying the same conditions are copied into a time ordered list called Potential(S.sub.0) that includes all of the control messages that potentially affect the routing decision on the packet at the switch S.sub.0.
(19) Three hash tables are initialized: RoutingTree(S.sub.0), storedStates(S.sub.0), and storedHops(S.sub.0). The packet is applied to the current flow table of the emulated switch S.sub.0 and the first flow table entry E having an output action and matching the packet and incoming port is found. If no entry is found, then there is no forwarding action for the packet at this point. If the list Potential(S.sub.0) is not empty, the next control message is selected and applied to the current flow table. This is repeated until either Potential(S.sub.0) is empty or a matching entry is found.
(20) The entry's output action specifies the next port. If RoutingTree(S.sub.0) already includes an entry corresponding to the same switch and next port, then the next control message is selected and applied to the current flow table to search for new next ports. Otherwise, a new hash table entry is created and inserted into RoutingTree(S.sub.0).
(21) The stored network topology information is used to find the other end of the network link connected to the next port. If there is no such link information, then the next control message is selected and applied to the current flow table. Otherwise processing continues from the connected switch (called the current switch in the following) and port.
(22) All control messages sent to the current switch, having a timestamp no later than T.sub.s and having control flow table entries that match the packet and incoming port on the packet fields, are put into a time ordered list activeMSG. If the list is empty, the hash table for the entry is updated to indicate in the tree that a dead end has been reached. If there are entries in the list, the emulated controller sends the control messages in the list to the emulated current switch in the same time order until the first message is found that satisfies the same timestamp condition set forth above.
(23) The qualifying messages are copied into a time ordered list Potential(currentSwitch), as these messages potentially affect the routing decision on the packet. They are used to record all possible next-hop routing decisions for the packet in the current switch. The packet is applied to the current flow table of the emulated switch currentSwitch and the first flow table entry F having an output action and matching the packet and incoming port is found. If there is no such entry, and if Potential(currentSwitch) is not empty, the first control message in the list is selected and applied to the emulated switch currentSwitch. The message is removed from Potential(currentSwitch).
(24) The output action of F specifies the next port. The hash table is updated with an entry identifying the next port. If there is already an entry in storedHops(S.sub.0) for currentSwitch on the current input point then a routing loop is detected and the message is removed from Potential(S.sub.0). Otherwise, a new key is inserted into storedHops(S.sub.0).
(25) If Potential(currentSwitch) is empty or uninitialized, the state is rolled back to the previous switch and the entry for the hop is deleted from storedStates(S.sub.0) and storedHops(S.sub.0). The entire set of potential messages is recursively evaluated in this way to build a set of one or more possible paths that the packet could have taken through the network 100. Once RoutingTree(S.sub.0) is complete, it can be searched for feasible routing paths to generate the output 120.
(26) The routing paths may be searched by repeating, for each key in RoutingTree(S.sub.0), a depth-first search. Whenever a leaf node is reached, the complete path from the root node to the leaf node is recorded with the concatenated per-node value information in the format of an ordered list. These lists may then be returned to the users to represent the recorded precise routing paths.
(27) It should be understood that embodiments described herein may be entirely hardware, entirely software or including both hardware and software elements. In a preferred embodiment, the present invention is implemented in hardware and software, which includes but is not limited to firmware, resident software, microcode, etc.
(28) Embodiments may include a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. A computer-usable or computer readable medium may include any apparatus that stores, communicates, propagates, or transports the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be magnetic, optical, electronic, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. The medium may include a computer-readable storage medium such as a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk, etc.
(29) A data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code is retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) may be coupled to the system either directly or through intervening I/O controllers.
(30) Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
(31) Referring now to
(32) A user interface 312 interfaces with query engine 314 to provide a user with the ability to enter a query for a specific packet at a given timestamp. The packet information includes packet headers. The query may furthermore optionally include information relating to the initial switch at which the packet entered the network 100. The query engine 114 provides the user's query to a network emulator 316 which uses a processor 302 to emulate the network 100 based on the control plane logs 308 and the stored network topology, creating a set of possible paths that the packet could have taken through the network. These possible paths are then displayed to the user through the user interface 312.
(33) The foregoing is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. Additional information is provided in Appendix A to the application. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that those skilled in the art may implement various modifications without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention.