Anomaly-Detection and Health-Analysis Techniques for Core Router Systems

This book tackles important problems of anomaly detection and health status analysis in complex core router systems, integral to today’s Internet Protocol (IP) networks. The techniques described provide the first comprehensive set of data-driven resilienc

  • PDF / 11,431,886 Bytes
  • 155 Pages / 439.43 x 683.15 pts Page_size
  • 60 Downloads / 266 Views

DOWNLOAD

REPORT


Anomaly-Detection and Health-Analysis Techniques for Core Router Systems

Anomaly-Detection and Health-Analysis Techniques for Core Router Systems

Shi Jin • Zhaobo Zhang • Krishnendu Chakrabarty Xinli Gu

Anomaly-Detection and Health-Analysis Techniques for Core Router Systems

Shi Jin Hardware Nvidia Corporation Sunnyvale, CA, USA Krishnendu Chakrabarty Electrical and Computer Engineering Duke University Durham, NC, USA

Zhaobo Zhang Futurewei Technologies Santa Clara, CA, USA Xinli Gu Futurewei Technologies Santa Clara, CA, USA

ISBN 978-3-030-33663-9 ISBN 978-3-030-33664-6 (eBook) https://doi.org/10.1007/978-3-030-33664-6 © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG. The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

To my parents, Dehai Jin and Xiashi Zhu for their endless support. To my love, Yicong Mao for her encouragement and unconditional love throughout these years! —Shi Jin

Preface

A three-layer hierarchy is typically used in modern telecommunication systems in order to achieve high performance and reliability. The three layers, namely core, distribution, and access, perform different roles for service fulfillment. The core layer is also referred to as the network backbone, and it is responsible for the transfer of a large amount of traffic in a reliable and timely manner. The network devices (such as routers) in the core layer are vulnerable to hard-to-detect/hard-to-recover errors. For example, the cards that constitute core router systems and the components that constitute a card can encounter hardware failures. Moreover, connectors between cards and interconnects between different components inside a card are also subject to hard faults. Also, since the performance requirement