dissertation-0-project-prop.../project-proposal.tex

295 lines
20 KiB
TeX
Raw Normal View History

2020-10-20 09:41:24 +01:00
% Document Setup
\documentclass[12pt]{article}
\usepackage[a4paper, margin=15mm, tmargin=1in]{geometry}
\usepackage{pdfpages}
\usepackage{graphicx}
2020-10-20 10:52:09 +01:00
\usepackage{tikz}
\usetikzlibrary{positioning}
2020-10-20 09:41:24 +01:00
\begin{document}
\includepdf{cover.pdf}
\section*{Introduction and Description of the Work}
2020-10-20 11:53:57 +01:00
This project attempts to combine multiple heterogeneous network connections into a single virtual connection, which has both the combined speed and the maximum resilience of the original connections. This will be achieved by inserting a Local Portal and a Remote Portal into the network path, as shown in Figure \ref{fig:sample-network}. While there are existing solutions that combine multiple connections, they prioritise one of resilience or speed over the other; this project will attempt to show that this trade-off can be avoided.
2020-10-20 09:41:24 +01:00
2020-10-20 11:53:57 +01:00
The speed focus of this software is achieved by providing a single virtual connection which aggregates the speed of the individual connections. As this single connection is all thats made visible to the client, all applications and protocols can benefit from the speed benefits, as they require no knowledge of how their packets are being split. As an example, a live video stream that only uses one flow will be able to use the full capacity of the virtual connection.
2020-10-20 19:07:19 +01:00
The resilience focus provides similar benefits, in that the virtual connection conceals the failing of any individual network connections from the client and applications. This again means that applications and protocols not built to handle a network failover can benefit from the resilience provided by this solution. An example is a SIP call continuing without a redial.
2020-10-20 09:41:24 +01:00
This system is useful in areas where multiple low bandwidth connections are available, but not a single higher bandwidth connection. This is often the case in rural areas in the UK. It will also be useful in areas with diverse connections of varying reliability, such as a home with both DSL and wireless connections, which may become more common with the advent of 5G and LEO systems such as Starlink. The lack of requirement for vendor support allows for this mixture of connections to be supported.
Some existing attempts to solve these problems, and the shortfalls of each solution, are summarized below:
\begin{itemize}
\item Failover: All existing flows must be restarted when failover occurs. There is no speed benefit over having a single connection.
\item Session Based Load Balancing: All flows on a failed connection must be restarted. Speed benefit varies between applications, but is excellent in ideal circumstances. This solution is less effective when parameters of the connections vary with time, as with wireless connections. Further, advanced policies can be required on an application level to achieve the best speed.
\item Application Support: Many modern protocols that are designed with mobile devices in mind can already handle IP changes (e.g. switching from WiFi to 4G). This allows these applications to handle situations such as Failover (above), as they treat it like any other network change. The downside of requiring application support is older protocols, such as SIP, for which resilience needs to be gained at a higher level.
\item MultiPath TCP: MPTCP works best with multiple interfaces on each device that is using it, e.g. a 4G and WiFi connection on a mobile device. This is due to a device on a NAT with access to two WAN connections having no direct knowledge of this. It also requires support on both ends, which isn't common yet (MPTCP is not yet mainlined in the Linux kernel). Further, many modern applications are moving away from TCP in favour of lighter UDP protocols, which wouldn't benefit from MPTCP support.
\item OpenVPN over MultiPath TCP: This allows both non-TCP based protocols, and clients that don't support MPTCP to benefit (if it's implemented network wide). Head of line blocking becomes more of an issue when passing multiple entirely different applications over a VPN, as any application can block any other. OpenVPN also adds a lot of unnecessary overhead if a network wide VPN would not otherwise be used.
\end{itemize}
2020-10-20 19:07:19 +01:00
By providing congestion control over each interface and therefore being able to share packets without bias between connections, this project should provide a superior solution for load balancing across heterogeneous and volatile network connections. An example of a client using this is shown in Figure \ref{fig:sample-network}. This solution is highly flexible, allowing the client to be a NAT Router with more devices behind it, or the flows from the Local Portal to the Remote Portal being tunnelled over a VPN.
2020-10-20 09:41:24 +01:00
\begin{figure}
2020-10-20 10:52:09 +01:00
\centering
\begin{tikzpicture}[
squarednode/.style={rectangle, draw=black!60, fill=red!5, very thick, minimum size=5mm},
]
% Nodes
\node[squarednode] (client) {Client};
2020-10-20 19:07:19 +01:00
\node[squarednode] (localserver) [right=of client] {Local Portal};
2020-10-20 10:52:09 +01:00
\node[squarednode] (modema) [above right=0.5 and 1 of localserver] {Modem A};
\node[squarednode] (modemb) [below right=0.5 and 1 of localserver] {Modem B};
2020-10-20 19:07:19 +01:00
\node[squarednode] (remoteserver) [below right=0.5 and 1 of modema] {Remote Portal};
2020-10-20 10:52:09 +01:00
\node[squarednode] (webserver) [above right=of remoteserver] {Web Server};
\node[squarednode] (voipserver) [right=of remoteserver] {VoIP Server};
\node[squarednode] (vpnserver) [below right=of remoteserver] {Corporate VPN};
% Edges
\draw[->] (client.east) -- (localserver.west);
\draw[->] (localserver.east) -- (modema.west);
\draw[->] (localserver.east) -- (modemb.west);
\draw[->] (modema.east) -- (remoteserver.west);
\draw[->] (modemb.east) -- (remoteserver.west);
\draw[->] (remoteserver.east) -- (webserver.west);
\draw[->] (remoteserver.east) -- (voipserver.west);
\draw[->] (remoteserver.east) -- (vpnserver.west);
\end{tikzpicture}
2020-10-20 09:41:24 +01:00
\caption{A network applying this proxy}
\label{fig:sample-network}
\end{figure}
\section*{Starting Point}
I have spent some time looking into the shortfalls and benefits of the available methods for combining multiple Internet connections. The Part IB course \emph{Computer Networking} has provided the background information for this project. I have significant experience with Go, though none with lower level networking. I have no experience with Rust, and my C++ experience is limited to the Part IB course \emph{Programming in C and C++}.
2020-10-20 19:07:19 +01:00
While I am not aware of any existing software that accomplishes the task that I propose, Wireguard performs a similar task of tunnelling between a local and remote node, has a well regarded interface, and is a well structured project, providing both inspiration and an initial model for the structure of my project.
2020-10-20 09:41:24 +01:00
\section*{Substance and Structure of the Project}
2020-10-20 19:07:19 +01:00
The system will involve load balancing multiple congestion controlled flows between the Local Portal and the Remote Portal. The Local Portal will receive packets from the client, and use load balancing and congestion control algorithms to send individual packets along one of the multiple available connections to the Remote Portal, which will extract the original packets and forward them along a high bandwidth connection to the wider network.
2020-10-20 09:41:24 +01:00
To achieve this congestion control, I will initially use TCP flows, which include congestion control. However, TCP also provides other guarantees, which will not benefit this task. For this reason, the application should be structured in such a way that it can support alternative protocols to TCP. An improved alternative is using UDP datagrams with a custom congestion control protocol, that only guarantees congestion control as opposed to packet delivery. Another alternative solution would be a custom IP packet with modified source and destination addresses and a custom preamble. Having a variety of techniques available would be very useful, as each of these has less overhead than the last, while also being less likely to work with more complicated network setups.
2020-10-20 19:07:19 +01:00
When the Local Portal has a packet it wishes to send outbound, it will place the packet and some additional security data in a queue. The multiple congestion controlled links will each be consuming from this queue when they are not congested. This will cause greedy load balancing, where each connection takes all that it can get from the packet queue. As congestion control algorithms adapt to the present network conditions, this load balancing will alter the balance between links as the capacity of each link changes.
2020-10-20 09:41:24 +01:00
Security is an important consideration in this project. Creating a multipath connection and proxies in general can create additional attack vectors, so I will perform a review of some existing security literature for each of these. However, as the tunnel created here transports entire IP packets, any security added by the application or transport layer will be maintained by my solution.
Examples are provided showing the path of a packet with standard session based load balancing, and with this solution applied:
\subsubsection*{Session Based Load Balancing}
A sample network is provided in Figure \ref{fig:sample-network-session-based}.
\begin{enumerate}
\item NAT Router receives the packet from the client.
\item NAT Router uses packet details and Layer 4 knowledge in an attempt to find an established connection. If there is an established connection, the NAT Router allocates this packet to that WAN interface. Else, it selects one using a defined load balancing algorithm.
\item NAT Router masquerades the source IP of the packet as that of the selected WAN interface.
\item NAT Router dispatches the packet via the chosen WAN interface.
\item Destination server receives the packet.
\end{enumerate}
\begin{figure}
2020-10-20 10:52:09 +01:00
\centering
\begin{tikzpicture}[
squarednode/.style={rectangle, draw=black!60, fill=red!5, very thick, minimum size=5mm},
]
% Nodes
\node[squarednode] (client) {Client};
\node[squarednode] (natrouter) [right=of client] {NAT Router};
\node[squarednode] (modema) [above right=0.5 and 1 of natrouter] {Modem A};
\node[squarednode] (modemb) [below right=0.5 and 1 of natrouter] {Modem B};
\node[squarednode] (webserver) [above right=0.25 and 1 of modema] {Web Server};
2020-10-20 15:28:41 +01:00
\node[squarednode] (voipserver) [below right=0.25 and 1 of modema] {VoIP Server};
\node[squarednode] (vpnserver) [below right=1.75 and 1 of modema] {Corporate VPN};
2020-10-20 10:52:09 +01:00
% Edges
\draw[->] (client.east) -- (natrouter.west);
\draw[->] (natrouter.east) -- (modema.west);
\draw[->] (natrouter.east) -- (modemb.west);
\draw[->] (modema.east) -- (webserver.west);
\draw[->] (modema.east) -- (voipserver.west);
\draw[->] (modemb.east) -- (vpnserver.west);
\end{tikzpicture}
2020-10-20 09:41:24 +01:00
\caption{A network with a NAT Router and two modems}
\label{fig:sample-network-session-based}
\end{figure}
\subsubsection*{This Solution}
A sample network is provided in Figure \ref{fig:sample-network}.
\begin{enumerate}
2020-10-20 19:07:19 +01:00
\item Local Portal receives the packet from the client.
\item Local Portal wraps the packet with additional information.
\item Local Portal sends the wrapped packet along whichever connection has available capacity.
\item Wrapped packet travels across the Internet to the Remote Portal.
\item Remote Portal receives the packet.
\item Remote Portal dispatches the unwrapped packet via its high speed WAN interface.
2020-10-20 09:41:24 +01:00
\item Destination receives the packet.
\end{enumerate}
\pagebreak
\section*{Success Criteria}
\begin{enumerate}
2020-10-22 09:23:38 +01:00
\item Demonstrate that a flow can be maintained over two connections of equal bandwidth with this solution if one of the connections becomes unavailable.
2020-10-20 09:41:24 +01:00
\item Any and all performance gains stated below should function bidirectionally (inbound/outbound to/from the client).
2020-10-20 19:07:19 +01:00
\item Allow the network client behind the main client to treat its IP address on the link to the Local Portal as the IP of the Remote Portal.
2020-10-20 09:41:24 +01:00
\item Provide security that is no worse than not using this solution at all.
\item Demonstrate that more bandwidth is available over two connections of equal bandwidth with this solution than is available over one connection without.
\end{enumerate}
\subsection*{Extended Goals}
\begin{enumerate}
\item Demonstrate that more bandwidth is available over two connections of unequal bandwidth than is available over two connections of equal bandwidth, where this bandwidth is the minimum of the unequal connections.
\item Demonstrate that more bandwidth is available over four connections of equal bandwidth than is available over three connections of equal bandwidth.
\item Demonstrate that if the bandwidth of one of two connections increases/decreases, the bandwidth available adapts accordingly.
\item Demonstrate that if one of two connections is lost and then regained, the bandwidth available reaches the levels of before the connection was lost.
2020-10-20 19:07:19 +01:00
\item My initial design requires the Remote Portal to have two interfaces: one for communicating with the Local Portal, and one for communicating with the wider network. This criteria is achieved by supporting both of these actions over one interface.
2020-10-20 09:41:24 +01:00
\item Support a metric value for connections, such that connections with higher metrics are only used for load balancing if no connection with a lower metric is available.
\end{enumerate}
\subsection*{Stretch Goals}
\begin{enumerate}
2020-10-22 09:23:38 +01:00
\item Provide full support for both IPv4 and IPv6. This includes reaching the Remote Portal over IPv6 but proxying IPv4 packets, and vice versa.
2020-10-20 09:41:24 +01:00
\item Provide a UDP based solution of tunnelling the IP packets which exceeds the performance of the TCP solution in the above bandwidth tests.
\item Provide an IP based solution of forwarding the IP packets which exceeds the performance of the UDP solution in the above bandwidth tests.
\end{enumerate}
2020-10-20 16:17:27 +01:00
Although these tests will be performed predominantly on virtual hardware, I will endeavour to replicate some of them in a non-virtual environment, though this will not be a part of the success criteria.
2020-10-20 09:41:24 +01:00
\pagebreak
\section*{Timetable and Milestones}
2020-10-20 10:56:24 +01:00
\subsection*{12/10/2020 - 1/11/2020 (Weeks 1-3)}
2020-10-20 09:41:24 +01:00
Study Go, Rust and C++'s abilities to read all packets from an interface and place them into some form of concurrent queue. Research the positives and negatives of each language's SPMC and MPSC queues.
\noindent \\
Milestone: Example programs in each language that read all packets from a specific interface and place them into a queue, or a reason why this isn't feasible. A decision of which language to use for the rest of the project, based on these code segments and the status of SPMC queues in the language.
2020-10-20 10:56:24 +01:00
\subsection*{02/11/2020 - 15/11/2020 (Weeks 4-5)}
2020-10-20 09:41:24 +01:00
Set up the infrastructure to effectively test any produced work from this point onwards.
\noindent \\
2020-10-20 19:07:19 +01:00
Milestone: A virtual router acting as a virtual Internet for these tests. 3 standard VMs below this level for each: the Local Portal, the Remote Portal and a speed test server to host iPerf3. Behind the Local Portal should be another virtual machine, acting as the client to test the speed from. Backups of this setup should also have been made.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{16/11/2020 - 29/11/2020 (Weeks 6-7)}
2020-10-20 09:41:24 +01:00
2020-10-20 19:07:19 +01:00
This section should focus on the security of the application. This would include the ability for someone to maliciously use a Remote Portal to perform a DoS attack. Draft the introduction chapter.
2020-10-20 15:28:41 +01:00
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 15:28:41 +01:00
Milestone: An analysis of how the security of this solution compares, both with other multipath solutions and a network without any multipath solution applied. A drafted introduction chapter.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{30/11/2020 - 20/12/2020 (Weeks 8-10)}
2020-10-20 09:41:24 +01:00
2020-10-20 19:07:19 +01:00
Implementation of the transport aspect of the Local Portal and Remote Portal. The first data structure for transport should also be created. This does not include the load sharing between connections - it is for a single connection. To enable testing, this will also require the setup of configuration options for each side. At this stage, it would be reasonable for the Remote Portal to require two different IPs - one for server communication, and one as the public IP of the Local Router. The initial implementation should use TCP, but if time is available, UDP with a custom datagram should be explored for reduced overhead.
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 19:07:19 +01:00
Milestone: A piece of software that can act either as the Local Portal or Remote Portal based on configuration. Any IP packets sent to the Local Portal should emerge from the Remote Portal.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{21/12/2020 - 10/01/2021 (Weeks 11-13)}
2020-10-20 09:41:24 +01:00
2020-10-20 15:28:41 +01:00
Create mock connections for tests that support variable speeds, a list of packet numbers to lose and a number of packets to stop handling packets after. Finalise the introduction chapter. Produce the first draft of the preparation chapter.
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 15:28:41 +01:00
Milestone: Mock connections and tests for the existing single transport. A finalised introduction chapter. A draft of the preparation chapter.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{11/01/2021 - 07/02/2021 (Weeks 14-17)}
2020-10-20 09:41:24 +01:00
2020-10-20 19:00:47 +01:00
Implement the load balancing between multiple connections for both servers. At this point, connection losses should be tested too. The progress report is due soon after this work segment, so that should be completed in here.
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 19:07:19 +01:00
Milestone: The Local Portal and Remote Portal are capable of balancing load between multiple connections. They can also suffer a network failure of all but one connection with minimal packet loss. The progress report should be prepared.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{08/02/2021 - 21/02/2021 (Weeks 18-19)}
2020-10-20 09:41:24 +01:00
2020-10-20 15:28:41 +01:00
Finalise the drafted preparation chapter. Draft the implementation chapter. Produce a non-exhaustive list of graphs and tests that should be included in the evaluation section.
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 15:28:41 +01:00
Milestone: Completed preparation chapter. Drafted implementation chapter. A plan of data to gather to back up the evaluation section.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{22/02/2021 - 21/03/2021 (Weeks 20-23)}
2020-10-20 09:41:24 +01:00
2020-10-20 15:28:41 +01:00
Finalise the implementation chapter. Gather the data required for graphs. Draft the evaluation chapter. Draft the conclusions chapter.
2020-10-20 09:41:24 +01:00
\noindent \\
2020-10-20 15:28:41 +01:00
Milestone: Finalised implementation chapter. Benchmarks and graphs for non-extended success criteria complete and added. First complete dissertation draft handed to DoS and supervisor for feedback.
2020-10-20 09:41:24 +01:00
2020-10-20 10:56:24 +01:00
\subsection*{22/03/2021 - 25/04/2021 (Weeks 24-28)}
2020-10-20 09:41:24 +01:00
Flexible time: divide between re-drafting dissertation and adding additional extended success criteria features, with priority given to re-drafting the dissertation.
\noindent \\
Milestone: A finished dissertation and any extended success criteria that have been completed.
2020-10-20 10:56:24 +01:00
\subsection*{26/04/2021 - 09/05/2021 (Weeks 29-30)}
2020-10-20 09:41:24 +01:00
New additions freeze. Nothing new should be added to either the dissertation or code at this point.
\noindent \\
Milestone: Bug fixes and polishing.
2020-10-20 10:56:24 +01:00
\subsection*{10/05/2021 - 14/05/2021 (Week 31)}
2020-10-20 09:41:24 +01:00
The project should already be submitted a week clear of the deadline, so this week has no planned activity.
\section*{Resources Required}
\begin{itemize}
2020-10-20 10:56:24 +01:00
\item Personal Computer (AMD R9 3950X, 32GB RAM)
2020-10-20 09:41:24 +01:00
\item Personal Laptop (AMD i7-8550U, 16GB RAM)
\end{itemize}
Used for development without requiring the lab. Testing this application will require extended capabilities, which would not be readily available on shared systems.
\begin{itemize}
\item Virtualisation Server (2x Intel Xeon X5667, 12GB RAM)
\item Backup Virtualisation Server (2x Intel Xeon X5570, 48GB RAM)
\end{itemize}
A virtualisation server allows controlled testing of the application, without any packets leaving the physical interfaces of the server.
I accept full responsibility for the above 4 machines and I have made contingency plans to protect myself against hardware and/or software failure. All resources will be backed up according to the 3-2-1 rule. This would allow me to migrate development and/or testing to the cloud if needed.
Go(Lang) code written will use a version later than that available on the MCS, as the version currently on the MCS (1.10) does not support Go Modules.
Rust is not available on the MCS at the time of writing. This can be managed by using personal machines or cloud machines accessed via the MCS.
\end{document}