Top Banner
RPT: Re-architecting Loss Protection for Content- Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ , and Srinivasan Seshan Carnegie Mellon University ǂ University of Wisconsin-Madison
25

RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

Dec 31, 2015

Download

Documents

Mildred Gibbs
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

RPT: Re-architecting Loss Protection for Content-Aware Networks

Dongsu Han, Ashok Anandǂ,

Aditya Akellaǂ, and Srinivasan Seshan

Carnegie Mellon UniversityǂUniversity of Wisconsin-Madison

Page 2: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

2

Motivation: Delay-sensitive communication

Time critical inter-data center communication [Maelstrom]

Soft-realtimeintra-data centercommunication [DCTCP, D3]

Real-time streams:FaceTime, Skype, on-line games.

Minimizing data loss in time-critical communication is important, but challenging because of the time constraint.

Maximum one way latency ~150ms

Response time ~250ms

Page 3: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

3

Loss protection today: Redundancy-based recovery

Forward Error Correction

Original packets (k)

Bandwidth for robustness

Redundant packets (n-k)

• FEC couples delay with redundancy• Small batch size makes FEC more susceptible to bursty loss• Difficult to tune parameters (n and k) [TIP2001,INFOCOM2010]

Amount of redundancy 20%~50% in Skype video[Multimedia’09]

Delay

Page 4: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

4

Content-aware networks changes the trade-off of redundancy

Content-aware networks = caching + content-aware processing to remove duplicates Caching effectively minimizes the bandwidth cost of redundancy

Redundancy elimination (RE) [SIGCOMM’08]

Examples

Bandwidth overhead of 100% redundancy: 3%

Content-Centric Networking (CCN) [CoNEXT’09]

RE cache

RE cache

Page 5: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

• Product: WAN optimizers (10+ vendors)– Cisco, Riverbed, Juniper, Blue Coat Systems– E.g., Cisco deployed RE on 200+ remote offices.– Corporate networks

• Riverbed: 50+ corporate customers, datacenter deployments

Deployment of content-aware networks

5

Main office

Branch

WAN optimizer

WAN optimizer

VPN (“Virtual wire”)

Isolation from Cross traffic

Page 6: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

6

RE Network

Redundant Packet Transmission (RPT)

• Introduce redundancy in a way that the network understands

Questions/Challenges• How do we make sure we retain the robustness benefits?• How much redundancy is needed? How does it compare with FEC?• Is this safe to use?

FEC

RPT

Redundancy Elimination Routerredu

ndan

t

Page 7: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

7

RE Network

Redundant Packet Transmission (RPT)

• Introduce redundancy in a way that the network understands

Questions/Challenges• How do we make sure we retain the robustness benefits?• How much redundancy is needed? How does it compare with FEC?• Is this safe to use?

FEC

RPT

Redundancy Elimination Router

Page 8: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

8

RPT on Redundancy Elimination (RE) Networks

Outgoing interfaces

Incoming interfaces

Queue RE cache

RE Decode

A’ A’ A

Decompressed packet

Compressed (deduplicated) packet

Packets

Loss model: Congestive packet loss that happens inside a router.

Redundancy Elimination Router

Low overhead

Robustness

RE cache holds packets received during the past ~10 secs

RE cache

RE Encode

Page 9: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

9

RE Networks

Redundant Packet Transmission• Introduce redundancy in a way that the

network understands

Redundant Transmission

Page 10: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

10

RE Networks

Redundant Packet Transmission• Introduce redundancy in a way that the

network understands

Benefits:• Retain the robustness benefits of redundancy • Minimize the bandwidth cost• Application can signal the importance of data. (Fine-grained control)

Page 11: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

11

A Case Study of RPT

Redundant Packet Transmission (RPT)- Send multiple copy of the same packet.- Send every packet r times.- Applied to live video in RE networks.

Hop-by-hop RE networks

SmartRE networks

Content Centric Networks (CCN)

Partially content-aware networks

Networks with link-layer loss

Time-critical communication

Redundant Packets Transmission

Page 12: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

12

Analytical Comparison with FEC

1E-7 1E-6 1E-5 1E-4 1E-3 1E-2 1E-1 1E+0 1E+10.00

0.10

0.20

0.30

0.40

0.50

Frac

tion

of O

verh

ead

End-to-end data loss rate (%)

RPT(3)

RPT(2)

FEC(10,8)

FEC(10,7)

FEC(10,9)

FEC(10,6)

FEC(10,5)

RPT(4)

2% random loss. = 0.02

Naive2% data loss0 overhead

Naive

Batch size (n=10)

Delay

Original pkts (k=8)

FEC(n=10,k=8)

Redundancy (r=3)

DelayRPT(3)

Coded redundancy

Page 13: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

13

Analytical Comparison with FEC

1E-7 1E-6 1E-5 1E-4 1E-3 1E-2 1E-1 1E+0 1E+10.00

0.10

0.20

0.30

0.40

0.50NaiveFEC(20,k)FEC(10,k)FEC(100,k)RPT(r)

Frac

tion

of O

verh

ead

End-to-end Data loss rate (%)

RPT(3)

RPT(2)

FEC(20,16) FEC(10,8)

FEC(100,90)

FEC(10,7)

FEC(10,9)

FEC(20,14)

FEC(10,6)

FEC(10,5)

RPT(4)

2% random loss. = 0.02

Batch size (n=20)

Delay

Original pkts (k=16)

FEC(n=20,k=16)

Page 14: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

14

Analytical Comparison with FEC

1E-7 1E-6 1E-5 1E-4 1E-3 1E-2 1E-1 1E+0 1E+10.00

0.10

0.20

0.30

0.40

0.50NaiveFEC(20,k)FEC(10,k)FEC(100,k)RPT(r)

Frac

tion

of O

verh

ead

End-to-end Data loss rate (%)

RPT(3)

RPT(2)

FEC(20,16) FEC(10,8)

FEC(100,90)

FEC(10,7)

FEC(10,9)

FEC(20,14)

FEC(10,6)

FEC(10,5)

RPT(4)

Scheme Max Delay@ 1Mbps

FEC(10,7) 168 ms

FEC(20,16) 300 ms

FEC(100,92) 1300 ms

RPT(r) Tunable

2% random loss. = 0.02

Skype video call 128~300kbpsSkype (HD) 1.2~1.5Mbps

Page 15: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

15

Experimental Evaluation

• Thorough evaluation on 3 different aspects of RPT– End user performance– Ease of use (parameter selection)– Impact on other traffic

• Methodology – Real experiment– Trace based experiment– Simulation

CIF: 352x288

Page 16: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

16

Evaluation Framework

• RE router implementation (Click, NS2) • Video quality evaluation using evalvid

FEC encoder

(n,k)

RPT(r,d)

Real

istic

Cros

s tr

affic

RE encoder

(RE)

RE decoder

SinkVi

deo

Sour

ce

RE

Sender Network Receiver

Measure BW overhead

Measure loss rate, video quality (PSNR)

RPT

FEC

Page 17: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

17

Naïve

RPT(2)

RPT(3)

RPT(4)

RPT(5)

FEC(10,9)

FEC(10,8)

FEC(10,7)

FEC(10,6)

FEC(10,5)

30

31

32

33

34

35

36

37

38 Encoded video at senderA

vera

ge P

SN

R (

dB)

E2E Performance: Video Quality

RPT FEC

(Before loss)

Page 18: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

Naïve

RPT(2)

RPT(3)

RPT(4)

RPT(5)

FEC(10,9)

FEC(10,8)

FEC(10,7)

FEC(10,6)

FEC(10,5)

30

31

32

33

34

35

36

37

38 Encoded video at sender Received videoA

vera

ge P

SN

R (

dB)

E2E Performance: Video Quality

18RPT FEC

Packet loss rate ~2%

Page 19: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

E2E Performance: Video Quality

19

Naïve UDPRPT(3) Overhead ~6% FEC(10,9) Overhead ~10%

1.8dB ~ 3dB difference in quality

Page 20: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

20

1E-04 1E-03 1E-02 1E-01 1E+00 1E+010

0.1

0.2

0.3

0.4Naive

FEC(10,k)

RS(r)

Fra

ctio

n of

Ove

rhea

d

RPT(4)

End-to-end Data Loss Rate (%)

FEC(10,9)

FEC(10,6)

FEC(10,8)

FEC(10,7)

RPT(2)RPT(3) Naive

E2E Performance: overhead and robustness

Packet loss rate ~2%

RPT(r)

Page 21: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

21

• RPT flows get prioritized.

Sender

Receiver (Non-RPT)

Receiver (RPT)

8000000 8500000 9000000 9500000 10000000OriginalRedundancy

0

Bandwidth use (Mbps)

0

9% loss

Impact on other traffic

Throughput reduction: 2%

(Before loss)

(After loss)

Packet loss rate : 9%.

RPT Flows

Loss

Other Flows

Loss

(After loss)

Page 22: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

22

• Not a problem: Important flows should be prioritized.• Problem: Unfair bandwidth allocation

Is flow prioritization a problem?

• How do provide fairness and robustness at the same time?• Core problem: RPT flows are not reacting to congestion. Apply TCP-friendly rate control to RPT.• Challenge: correctly accounting for possible changes in loss pattern

TCP throughput : 18Mbps

TCP throughput: 12Mbps

Page 23: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

23

Other results in the paper

• Demonstration of RPT in a real-world setting – E.g., Emulated corporate VPN scenario

• Trace-based experimental results• Detailed parameter sensitivity study• Network safety (impact on the network)• Design and evaluation of TCP-friendly RPT• Strategies on other content-aware networks

Page 24: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

24

Generalized RPT• Many sophisticated schemes are enabled by FEC.

– Priority encoding transmission (PET), unequal error protection (UEP), multiple description coding (MDC)

Very important: Sent x3 (byte-level redundancy) Important: Sent x2 PET/MDC

Prioritization within a flow for graceful degradation of quality

Redundancy elimination networks [SIGCOMM’08]

UEP

I-frameP-frame

Page 25: RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University.

25

Conclusion

• Key Idea of RPT: Don’t hide, expose redundancy!• Key Features– High robustness, low overhead user performance– Ease of use: parameter selection, per-packet

redundancy/delay control– Flow prioritization

• Applicability– Applies to delay-sensitive communications in

content-aware networks in general.