Overview and Evaluation of the Server Redundancy and Session Failover Mechanisms in the Reliable Server Pooling Framework∗

Overview and Evaluation of the Server Redundancy and Session Failover Mechanisms in the Reliable Server Pooling Framework∗

International Journal On Advances in Internet Technology, vol 2 no 1, year 2009, http://www.iariajournals.org/internet_technology/ 1 Overview and Evaluation of the Server Redundancy and Session Failover Mechanisms in the Reliable Server Pooling Framework∗ Thomas Dreibholz, Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics Ellernstrasse 29, 45326 Essen, Germany fdreibh,[email protected] Abstract cations world, where availability is ensured by redundant links and devices [2] – there had not been any generic, stan- The number of availability-critical Internet applications dardized approaches for the availability of Internet-based is steadily increasing. To support the development and op- services. Each application had to realize its own solution eration of such applications, the IETF has recently defined a and therefore to re-invent the wheel. This deficiency – once new standard for a common server redundancy and session more arisen for the availability of SS7 (Signalling System failover framework: Reliable Server Pooling (RSerPool). No. 7) services over IP networks – had been the initial mo- The basic ideas of the RSerPool framework are not entirely tivation for the IETF RSerPool WG to define the Reliable new, but their combination into a single, resource-efficient Server Pooling (RSerPool) framework. The basic ideas of and unified architecture is. Service availability achieved by RSerPool are not entirely new (see [3, 4]), but their combi- the redundancy of servers directly leads to the issues of load nation into one application-independent framework is. distribution and load balancing, which are both important Server redundancy [5] leads to the issues of load distri- for the performance of RSerPool systems. Therefore, it is bution and load balancing [6], which are also covered by crucial to evaluate the performance of such systems with RSerPool [7, 8]. But unlike solutions in the area of GRID respect to the load balancing strategy required by the ser- and high-performance computing [9], the RSerPool archi- vice application. tecture is intended to be lightweight. That is, RSerPool may In this article – which is an extended version of our pa- only introduce a small computation and memory overhead per [1] – we first present an overview of the RSerPool ar- for the management of pools and sessions [8,10–12]. In par- chitecture with a focus on the component failure detection ticular, this means the limitation to a single administrative and handling mechanisms. We will also shortly introduce domain and only taking care of pool and session manage- the underlying SCTP protocol and its link redundancy fea- ment – but not for higher-level tasks like data synchroniza- tures. After that, we will present a quantitative, application- tion, locking and user management. These tasks are con- independent performance analysis of the failure detection sidered to be application-specific. On the other hand, these and session failover mechanisms provided by RSerPool, restrictions allow for RSerPool components to be situated with respect to important adaptive and non-adaptive load on low-end embedded devices like routers or telecommuni- balancing strategies. cations equipment. Keywords: Reliable Server Pooling, Service Availability, Redundancy, Session Failover, Server Selection While there have already been a number of publica- tions on applicability and performance of RSerPool (see e.g. [7, 13–17]), a generic, application-independent perfor- mance analysis of its failover handling capabilities was 1 Introduction and Related Work still missing. In particular, it is necessary to evaluate the different RSerPool mechanisms for session monitor- Service availability is becoming increasingly important ing, server maintenance and failover support – as well as in today’s Internet. But – in contrast to the telecommuni- the corresponding system parameters – in order to show ∗Parts of this work have been funded by the German Research Founda- how to achieve a good system performance at a reason- tion (Deutsche Forschungsgemeinschaft). ably low maintenance overhead. The goal of our work is International Journal On Advances in Internet Technology, vol 2 no 1, year 2009, http://www.iariajournals.org/internet_technology/ 2 be applied to allow for endpoint mobility. This link redun- dancy feature is called multi-homing [21,22] and illustrated in Figure1. An endpoint sees each remote address as unidi- rectional path. In each direction, one of the paths is selected as so-called primary path. This path is used for the trans- port of user data. The other paths are backup paths, which are used for retransmissions only. Upon failure of the pri- mary path, SCTP selects a new primary path from the set of possible backup paths. That is, as long as there is at least one usable path in each direction, the association remains usable despite of link failures. However, multi-homing can- not protect a service against endpoint failures. To cope with this problem, the IETF has defined the RSerPool architec- Figure 1. A Multi-Homed SCTP Association ture on top of SCTP. an application-independent quantitative characterization of 2.2 Architecture RSerPool systems, as well as a generic sensitivity analysis on changes of workload and system parameters. Especially, Figure2 illustrates the RSerPool architecture, as de- we intend to identify the critical parameter ranges in order fined in [23]. It consists of three major component classes: to provide guidelines for design and configuration of effi- servers of a pool are called pool elements (PE). Each pool is cient RSerPool-based services. identified by a unique pool handle (PH) in the handlespace, This article is an extended version of our conference i.e. the set of all pools. The handlespace is managed by paper [1]. It contains a broader overview of the redun- pool registrars (PR), which are also shortly denoted as reg- dancy mechanisms provided by RSerPool and the under- istrars. PRs of an operation scope synchronize their view lying SCTP protocol as well as a more detailed analysis of of the handlespace using the Endpoint haNdlespace Redun- the session failover mechanisms. dancy Protocol (ENRP [24]), transported via SCTP. An op- The document is structured as follows: in Section2, we eration scope has a limited range, e.g. a company or orga- present an overview of RSerPool and the underlying SCTP nization; RSerPool does not intend to scale to the whole protocol. A generic quantification of RSerPool systems Internet. This restriction results in a very small pool man- is introduced in Section3. Using the RSPSIM simulation agement overhead (see also [8,10,25]), which allows to host model and setup described in Section4, we evaluate the a PR service on routers or embedded systems. Neverthe- server failure detection and handling features of RSerPool less, it is assumed that PEs can be distributed worldwide, in Section5. for their service to survive localized disasters [26, 27]. A client is called pool user (PU) in RSerPool terminol- 2 The RSerPool Architecture ogy. To use the service of a pool given by its PH, a PU requests a PE selection from an arbitrary PR of the oper- ation scope, using the Aggregate Server Access Protocol RSerPool is based on the SCTP transport protocol. (ASAP [28, 29]). The PR selects the requested list of PE Therefore, it is necessary to shortly introduce this protocol identities using a pool-specific selection rule, called pool and its link failure handling features first. policy. Adaptive and non-adaptive pool policies are defined in [30]; relevant for this article are the non-adaptive policies 2.1 Data Transport and Motivation Round Robin and Random and the adaptive policy Least Used. Least Used selects the least-used PE, according to The Stream Control Transmission Protocol (SCTP, up-to-date load information. The actual definition of load is see [18,19]) is a connection-oriented, general-purpose, uni- application-specific: for each pool the corresponding appli- cast transport protocol which provides reliable transport of cation has to specify the actual meaning of load (e.g. CPU user messages. An SCTP connection is denoted as associ- utilization or storage space usage) and present it to RSer- ation. Each SCTP endpoint can use multiple IPv4 and/or Pool in form of a numeric value. Among multiple least- IPv6 addresses to provide network fault tolerance. The ad- loaded PEs, Least Used applies Round Robin selection (see dresses used by the endpoints are negotiated during asso- also [8]). Some more policies are evaluated in [26, 27, 31]. ciation setup, a later update is possible using dynamic ad- A PE can register into a pool at an arbitrary PR of the op- dress reconfiguration (Add-IP, see [20]). Add-IP can also eration scope, again using ASAP transported via SCTP. The International Journal On Advances in Internet Technology, vol 2 no 1, year 2009, http://www.iariajournals.org/internet_technology/ 3 Figure 2. The RSerPool Architecture chosen PR becomes the Home PR (PR-H) of the PE and is built-in mechanism: Client-Based State Sharing. This also responsible for monitoring the PE’s health by endpoint mechanism has been proposed by us in our paper [32] and it keep-alive messages. If not acknowledged, the PE is as- is now part of the ASAP standard [28]. Using this feature, sumed to be dead and removed from the handlespace. Fur- which is illustrated in Figure4, a PE can send its current thermore, PUs may report unreachable PEs; if the threshold session state to the PU in form of a state cookie. The PU MAX-BAD-PE-REPORT of such reports is reached, a PR stores the latest state cookie and provides it to a new PE may also remove the corresponding PE. The PE failure de- upon failover. Then, the new PE simply restores the state tection mechanism of a PU is application-specific. described by the cookie. For RSerPool itself, the cookie is Proxy Pool Elements (PPE) allow for the usage of opaque, i.e.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us