Optimality of a Network Monitoring Agent and Validation in a Real Probe
Abstract
:1. Introduction
- The packet is transferred from Network Interface Card (NIC) to the ring buffer. Since this is a Direct Memory Access (DMA) transfer, all of the actions related to this packet movement are completed without consuming any CPU’s resources.
- Finally, the packets are treated by the monitoring application and they are pulled out from the analysis buffer. This is the analyzing process in Figure 1.
2. Model Description
An Equivalent Discrete Time Model
- At any time slot, and given that the capturing queue is not full (with M packets in its buffer), a new packet arrives to the network with probability ;
- If the processor is working in the capturing queue, and the queue is not empty, the processor captures a packet within one time slot with probability ;
- If the processor is working in the analysis queue, and this queue is not empty, the processor finishes the analysis stage of a packet within one time slot with probability .
3. MDP Formulation
- is the action set of the system. At any time, selecting action C represents allocating the processor to the first queue for packet capturing, whereas action A represents allocating the processor to the second queue for packet analysis;
- is the state space of the system. If the state of the system is , with , and , this means that there are mpackets queuing in the capturing queue, npackets queuing in the analysis queue, and that the previous action taken by the system has been p, representing the current position of the processor;
- is the one-period expected reward earned by the system if action is chosen when the system is in state ;
- is the state-transition matrix if action is decided at the beginning of a period. If and , then the transition probability of moving from state s to state is .
3.1. Reward Structure
3.2. Transition Probabilities
3.3. Optimization Problem
3.4. Numerical Solution
- Fix an arbitrary initial value for all .
- For , calculate recursively:
- –
- –
- Let n grow
- , and
- ,
4. Performance Evaluation of the Model
4.1. Estimation of Parameters
- is related to the network packet rate. In the testing scenario, the traffic generator allows us to set the packet injection rate into the network and we choose 21 rates varying from 50,000 to 1,500,000 pps. In addition, the test manager gathers the packet rate from the network switch to which the probe is connected. These values of network traffic rate are directly used as the input parameter of the model. As we keep the same values of the experimental tests, it will be possible to compare the theoretical results of the numerical evaluation of the model with the experimental ones. Due to the fact that the tests are performed for each one of the rates produced by the traffic generator, there are experimental results for each one of those network traffic rates;
- is the packet capturing rate. We estimate it by considering the total amount of packets captured by the softirq processing during the test (which we denote as ) and the time spent by the CPU in the softirq (denoted as ). Both and are provided by the test manager since, during the test, the number of packets captured by the polling process of the softirq and the number of cycles consumed by the CPU in the capturing stage are counted. A simple conversion from CPU cycles to seconds allows us to obtain . Thus, is estimated as follows:
- is the packet analysis rate and, if and denote the total amount of packets processed by the analysis stage during the test and the total time devoted by the CPU to analysis purposes, respectively, we obtain the following estimation for :Similarly to , the term is derived from the number of cycles consumed by the CPU in the analysis stage during the test. It is also worth mentioning that the probe’s performance is measured under different analysis loads. Three scenarios are implemented to simulate a low analysis load, a medium analysis load and a high analysis load. For this reason, there are different values assigned for the parameter , one for each analysis load. As each analysis load is implemented with a loop that takes a different number of cycles in each case (in particular, 0, 300 and 1000 cycles for low, medium and high loads, respectively), from now on, we will assign null to the low load scenario, 0.3 k to the medium load scenario and 1 k to the high load scenario;
- M is the capacity of the capturing buffer. In the case of the probe used in the testbed, its typical value is 200. For this reason, for the numerical evaluation;
- N is the capacity of the analysis buffer. The typical value is 4096 in the probe of the test. Therefore, .
4.2. Structure of the Optimal Policy
4.3. Performance of the Optimal Policy
5. Implementation and Validation in a Network Probe
5.1. Policy Based on a Threshold Value
- Policy based on a threshold which depends on m. It works as follows:
- ifthen
- else
- end if
- Policy based on a threshold which depends on n. It works as follows:
- ifthen
- else
- end if
- Step-wise policy which depends on m and n. It works as follows:
- iforthen
- else
- end if
5.2. Comparing Optimal and Real Analysis Throughputs
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Pramanik, A.; Sarkar, S.; Maiti, J. A real-time video surveillance system for traffic pre-events detection. Accid. Anal. Prev. 2021, 154, 106019. [Google Scholar] [CrossRef] [PubMed]
- Liao, H.J.; Lin, C.H.R.; Lin, Y.C.; Tung, K.Y. Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Abdel-Gawad, H.I.; Baleanu, D.; Abdel-Gawad, A.H. Unification of the different fractional time derivatives: An application to the epidemic-antivirus dynamical system in computer networks. Chaos Solitons Fractals 2021, 142, 110416. [Google Scholar] [CrossRef]
- Aktas, M.S. Hybrid cloud computing monitoring software architecture. Concurr. Comput. Pract. Exp. 2018, 30, e4694. [Google Scholar] [CrossRef]
- Schneider, F.; Wallerich, J.; Feldman, A. Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware. In Proceedings of the 8th International Passive and Active Measurement Conference, PAM 2007, Louvain-la-neuve, Belgium, 5–6 April 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 207–217. [Google Scholar]
- Ntop Project. Available online: http://www.ntop.org (accessed on 19 December 2022).
- Pereira, R.I.; Dupont, I.M.; Carvalho, P.C.; Jucá, S.C. IoT embedded linux system based on Raspberry Pi applied to real-time cloud monitoring of a decentralized photovoltaic plant. Measurement 2018, 114, 286–297. [Google Scholar] [CrossRef]
- Jo, E.; Yoo, H. Implementation of cloud monitoring system based on open source monitoring solution. In Software Engineering in IoT, Big Data, Cloud and Mobile Computing; Springer: Berlin/Heidelberg, Germany, 2021; pp. 181–190. [Google Scholar]
- Freitas, E.; de Oliveira Filho, A.T.; do Carmo, P.R.; Sadok, D.; Kelner, J. A survey on accelerating technologies for fast network packet processing in Linux environments. Comput. Commun. 2022, 196, 148–166. [Google Scholar] [CrossRef]
- Bovet, D.; Cesati, M. Understanding the Linux Kernel, Third Edition; O’Reilly Media: Sebastopol, CA, USA, 2005. [Google Scholar]
- Fusco, F.; Deri, L. High Speed Network Traffic Analysis with Commodity Multi-core Systems. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC’10, Melbourne, Australia, 1–3 November 2010; ACM: New York, NY, USA, 2010; pp. 218–224. [Google Scholar] [CrossRef] [Green Version]
- Moreno, V.; Del Rio, P.M.S.; Ramos, J.; Garcia-Dorado, J.L.; Gonzalez, I.; Arribas, F.J.G.; Aracil, J. Packet storage at multi-gigabit rates using off-the-shelf systems. In Proceedings of the 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS), Paris, France, 20–22 August 2014; IEEE: Piscataway Township, NJ, USA, 2014; pp. 486–489. [Google Scholar]
- Trevisan, M.; Finamore, A.; Mellia, M.; Munafo, M.; Rossi, D. Traffic Analysis with Off-the-Shelf Hardware: Challenges and Lessons Learned. IEEE Commun. Mag. 2017, 55, 163–169. [Google Scholar] [CrossRef] [Green Version]
- Wu, W.; Crawford, M.; Bowden, M. The performance analysis of Linux networking – packet receiving. Comput. Commun. 2007, 30, 1044–1057. [Google Scholar] [CrossRef] [Green Version]
- Salah, K.; Elbadawi, K.; Boutaba, R. Performance modeling and analysis of network firewalls. IEEE Trans. Netw. Serv. Manag. 2012, 9, 12–21. [Google Scholar] [CrossRef]
- Li, X.; Ren, F.; Yang, B. Modeling and analyzing the performance of high-speed packet I/O. Tsinghua Sci. Technol. 2021, 26, 426–439. [Google Scholar] [CrossRef]
- El Kafhali, S.; Salah, K. Performance analysis of multi-core VMs hosting cloud SaaS applications. Comput. Stand. Interfaces 2018, 55, 126–135. [Google Scholar] [CrossRef]
- El Kafhali, S.; Salah, K. Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems. IET Netw. 2019, 8, 48–58. [Google Scholar] [CrossRef]
- Bolla, R.; Bruschi, R.; Carrega, A.; Davoli, F. Green networking with packet processing engines: Modeling and optimization. IEEE/ACM Trans. Netw. 2014, 22, 110–123. [Google Scholar] [CrossRef]
- Ibrahim, A.G.M.; Khedr, M.E.; Shaheen, M. Power Consumption of Packet Processing Engines and Interfaces of Edge Router: Measurements and Modeling. In Proceedings of the ICNS 2016: The Twelfth International Conference on Networking and Services, Lisbon, Portugal, 26–30 June 2016. [Google Scholar]
- Prados-Garzon, J.; Ameigeiras, P.; Ramos-Munoz, J.J.; Navarro-Ortiz, J.; Andres-Maldonado, P.; Lopez-Soler, J.M. Performance modeling of softwarized network services based on queuing theory with experimental validation. IEEE Trans. Mob. Comput. 2019, 20, 1558–1573. [Google Scholar] [CrossRef]
- Agarwal, S.; Malandrino, F.; Chiasserini, C.F.; De, S. VNF placement and resource allocation for the support of vertical services in 5G networks. IEEE/ACM Trans. Netw. 2019, 27, 433–446. [Google Scholar] [CrossRef] [Green Version]
- Faraci, G.; Lombardo, A.; Schembra, G. A building block to model an SDN/NFV network. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar]
- Leland, W.; Taqqu, M.; Willinger, W.; Wilson, D. On the self-similar nature of Ethernet traffic. IEEE/ACM Trans. Netw. 1994, 2, 1–15. [Google Scholar] [CrossRef] [Green Version]
- Puterman, M.L. Markov Decision Processes: Discrete Stochastic Dynamic Programming; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
- Bertsekas, D. Dynamic Programming and Optimal Control: Volume I; Athena Scientific: Nashua, NH, USA, 2012; Volume 1. [Google Scholar]
- Munoz, A.; Ferro, A.; Liberal, F.; Lopez, J. A Kernel-Level Monitor over Multiprocessor Architectures for High-Performance Network Analysis with Commodity Hardware. In Proceedings of the 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), Valencia, Spain, 14–20 October 2007; pp. 457–462. [Google Scholar]
- Pineda, A.; Zabala, L.; Ferro, A. Network architecture to automatically test traffic monitoring systems. In Proceedings of the Mosharaka International Conference on Communications and Signal Processing (MIC-CSP2012), Barcelona, Spain, 6–8 April 2012. [Google Scholar]
- Endace Ltd. Available online: https://www.endace.com (accessed on 11 January 2023).
- Benvenuti, C. Understanding Linux Network Internals; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2006. [Google Scholar]
(pps) | (pps) | (pps) | M | N | |
---|---|---|---|---|---|
50,000 | 902,798 (null) | 0.4 (null) | |||
⋯ | 1,188,786 | 289,119 (0.3 k) | 200 | 4096 | 0.2 (0.3 k) |
1,500,000 | 116,755 (1 k) | 0.1 (1 k) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zabala, L.; Doncel, J.; Ferro, A. Optimality of a Network Monitoring Agent and Validation in a Real Probe. Mathematics 2023, 11, 610. https://doi.org/10.3390/math11030610
Zabala L, Doncel J, Ferro A. Optimality of a Network Monitoring Agent and Validation in a Real Probe. Mathematics. 2023; 11(3):610. https://doi.org/10.3390/math11030610
Chicago/Turabian StyleZabala, Luis, Josu Doncel, and Armando Ferro. 2023. "Optimality of a Network Monitoring Agent and Validation in a Real Probe" Mathematics 11, no. 3: 610. https://doi.org/10.3390/math11030610
APA StyleZabala, L., Doncel, J., & Ferro, A. (2023). Optimality of a Network Monitoring Agent and Validation in a Real Probe. Mathematics, 11(3), 610. https://doi.org/10.3390/math11030610