Quiz #4 Flashcards
1. What can go wrong in DC networks? 2. What are the tools for testing and debugging? 3. What are the tools for measurements and performance analysis?
What is the relationship between throughput and latency?
- Latency is the time it takes for a packet to go from point A to point B, while throughput is the number of packets per unit time that can be sent between point A and point B
- Lower latency implies
greater throughput, but no the other way around.
What is utilization?
Utilization has to do with how well the resources in the system as a whole are being utilized.
How well the networking infrastructure is used.
What is Scalability in the context of DC networks?
As you increase the offered load into the system, is the performance that is experienced by the applications remaining unchanged?
In regard to performance evaluation, what is the difference between Modeling and Simulation?
Modeling is mathematically expressing the behavior of the system while simulation is constructing a computer program that mimics the behavior of the system.
Modeling is a quicker way of validating design ideas than simulation
What can go wrong in DC networks?
- Forwarding loops
- Link failures
- Forwarding inconsistencies - often leads to forwarding loops.
- Unreachable hosts (network could get fragmented due to failed links and this may lead to a partition in the network)
- Unwarranted access to hosts
What is forwarding loops?
you expect that every hop of the packet is making an advanced towards the destination. But if that is not happening and it keeps cycling back and forth, that’s the forwarding loop. That could be because of the tables being incorrectly set.
What is the reason for forwarding inconsistencies?
this has to do with the fact that in a large network, all the tables are not getting updated at the same time, it is happening at different times. There could be inconsistencies between the forwarding tables from one switch to the next twitch.
How domain-specific languages can be useful to testing and debugging?
you want domain-specific languages that limit the kinds of errors that you can potentially get in the way the control is setup. It also means that you have a limited set of primitives that are used for programming these switches.
What is the limitation of model checking?
Model checking (in its pristine form), is unscalable to large systems because there are too many state pieces.
*You have to constrain the state spaces so that you can actually test and debug your system, and that’s why combining model checking technique with symbolic execution is an appealing way of dealing with testing and debugging of data center networks.
What are the effects of network bugs?
- Unauthorized entry of packets into a secured zone
- Vulnerability of services and the infrastructure to attacks
- Denial of critical services
- Affect network performance and violation of SLAs (system level agreements)
What are the elements of NICE’s secret sauce?
- State-Space exploration via Model Checking (MC)
2. Combine Symbolic Execution (SE) with Model Checking to prevent state-space explosion.
What are the keys to scalability of OFRewind?
*OFRewind is a static analysis tool of OpenFlow programs.
- Record only control plane traffic
- Skip/aggregate data plan traffic
- Best effort replay as opposed to deterministic (because the idea is to identify whether there was any performance problems/correctness issues in the behavior).
What constitutes a network breakpoint in NDB? Select
all that apply
NDB = Network Debugger.
Breakpoint is a filter on packet header, e.g.
Switches send “postcard” on matching entries to a central collector.
Collector stores the postcards to construct a “backtrace”.
What are the main elements of Header Space
Analysis? Select all that apply
- Packet (with a header size of L) as a point in a L-dimensional hyperspace
- Switches as transformers causing state transition of the packet headers - T3(T2(T1(h)))
What are the common sources of “small” packets in the DC network?
*Packets with length < 200 bytes are considered small, and from all packets, there ~50% such packets.
The common sources are packets like TCP acks and “I am alive” msg, i.e. control messages.