[armd] For your consideration: SEATTLE

Matthew Caesar <caesar@cs.illinois.edu> Fri, 29 July 2011 11:42 UTC

Return-Path: <caesar@cs.illinois.edu>
X-Original-To: armd@ietfa.amsl.com
Delivered-To: armd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AB7F21F8B75 for <armd@ietfa.amsl.com>; Fri, 29 Jul 2011 04:42:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mdGa3Ghd8nCm for <armd@ietfa.amsl.com>; Fri, 29 Jul 2011 04:42:43 -0700 (PDT)
Received: from citesht3.cites.illinois.edu (citesht3.cites.illinois.edu [192.17.212.153]) by ietfa.amsl.com (Postfix) with ESMTP id 7992621F8B38 for <armd@ietf.org>; Fri, 29 Jul 2011 04:42:43 -0700 (PDT)
Received: from [192.168.1.2] (192.17.212.139) by smtp.illinois.edu (192.17.212.153) with Microsoft SMTP Server (TLS) id 14.1.289.1; Fri, 29 Jul 2011 06:42:42 -0500
Message-ID: <4E329CB2.8010908@cs.illinois.edu>
Date: Fri, 29 Jul 2011 06:42:42 -0500
From: Matthew Caesar <caesar@cs.illinois.edu>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.18) Gecko/20110617 Thunderbird/3.1.11
MIME-Version: 1.0
To: <armd@ietf.org>
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 8bit
Subject: [armd] For your consideration: SEATTLE
X-BeenThere: armd@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion of issues associated with large amount of virtual machines being introduced in data centers and virtual hosts introduced by Cloud Computing." <armd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/armd>, <mailto:armd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/armd>
List-Post: <mailto:armd@ietf.org>
List-Help: <mailto:armd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/armd>, <mailto:armd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jul 2011 11:44:05 -0000

Hi,

I've been watching this list with a lot of interest. We wanted to post 
for your consideration a protocol called SEATTLE we've been developing, 
which targets large improvements in scalability of layer-2 in the 
context of data centers/cloud computing by eliminating the need for 
broadcasts. We think SEATTLE addresses some of the goals in ARMD's 
charter. More details below, but we'd be quite interested to 
discuss/answer questions if there's interest.

SEATTLE achieves the same configuration-free properties as Ethernet 
bridging yet scales to large networks. Unlike other proposals (e.g., 
TRILL, Rbridges, Viking, SmartBridges), SEATTLE completely eliminates 
the need for network-wide broadcasting, achieving data-plane control 
overheads that grow logarithmically with network size. SEATTLE is 
backwards-compatible with existing Ethernets, simplifying incremental 
deployment, and supporting existing Ethernet functions (e.g., VLANs and 
host bootstrapping). SEATTLE also supports more advanced (optional) 
features, such as the ability to search and look up services based on 
text strings, more flexible routing and more control over layer-2 
routing policies, and the ability to anycast and load balance directly 
over named services. SEATTLE has two main features:

Distributed in-network directory service: The switches collectively run 
a directory service that handles ARP and DHCP requests, as well as 
packets sent to unknown destination addresses. The directory service 
leverages consistent hashing and the link-state routing protocol to form 
a one-hop distributed hash table. The directory is a key-value store, 
where the hash of the key determines the switch(es) responsible for 
storing the information. For example, for ARP queries, the key is an IP 
address and the value includes the IP address and the host’s location. 
When an ingress switch cannot handle an ARP/DHCP request or a data 
packet directly, the switch computes the hash and directs the packet 
through the responsible intermediate switch. The intermediate switch can 
response to ARP and DHCP queries, and direct data packets onward to 
their egress switch while returning the destination host’s location to 
the ingress switch.

Reactive caching and invalidation: To minimize the portion of traffic 
directed over longer paths, an ingress switch reactively caches the 
responses from the intermediate switch. For example, while an 
intermediate switch may handle an ARP query, the data packets typically 
flow directly along the shortest path. In addition, other hosts 
connected to the same ingress switch benefit from the cached 
information. However, the cached information becomes stale if a host 
moves to a new location. SEATTLE includes an efficient cache 
invalidation protocol that reactively updates the stale cache entries 
when a packet wrongly travels to the old egress switch.

The first feature leads to good performance (by keeping traffic in the 
data plane, and avoiding broadcast) and self scaling (by having the 
directory service naturally scale with the size of the network), and the 
second ensures fast recovery after failures and migration.

Our writeup on SEATTLE:

http://www.cs.princeton.edu/~jrex/papers/seattle08.pdf

presents more details on this protocol, our experiences designing and 
implementing a system prototype, and a performance evaluation of the 
protocol through simulations and deployment in a testbed.

-- Matt