Distributed Network Measurement Protocol (DNMP)
This repository is for releases of DNMP. This in-progress work builds on the proof-of-concept code developed under NIST SBIR 70NANB18H186 and makes use of Pollere's Versatile Security and Bespoke Transport projects. The current release doesn't have the full run-time security code included as parts of it are still being tested.
DNMP has client and NOD (network observer daemon) processes that use NDN to communicate. Clients request measurements from NODs which use probe functions to gather metrics. The communication model is pub/sub, implemented by a lightweight pub/sub transport, syncps, and the DNMP-specific shim code.
Currently, all the metrics are gathered using the NDN Measurement Protocol; but a new metric is under development that requires some patches to NFD code. The trust schema integration into the bespoke transport modules is under development. (More about DNMP, VerSec, and Bespoke Transport model in Lessons Learned Building a Secure Network Measurement Framework using Basic NDN, ACM ICN September, 2019 and seehttp://pollere.net/Pdfdocs/ICN-WEN-190715.pdf and https://vimeo.com/354013644 )
With all the libraries installed, type "make". Works on Macs and Linux and multicast strategy uses IP multicast so only one copy of a command goes out on broadcast meda (e.g. WiFi). Note that this should have NFD patches to run properly (without them, it should run, but will be slow). Use the no-nacks-on-multicast-faces and ship-pending-interests-on-register patches at https://github.com/pollere/NDNpatches for broadcast performance.
The host must be running an NDN Forwarding Daemon. Then start a nod (no arguments). Clients are run from the command line, eg:
genericCLI -p probeType -a probeArgs -t target -c request_count -i request_interval
where genericCLI is a generic client that runs from the command line and can request the metrics that the NFD Measurement Protocol can access. The client arguments are further documented in the code: note that probeArgs can be optional for some probeTypes and target, request count and request interval (in seconds) have defaults (local, 1, and 1 sec respectively) if not set.
Current probeType list:
NFDStrategy: nfdStrategyProbe NFDRIB: nfdRIBProbe NFDGeneralStatus: nfdGSProbe NFDFaceStatus: nfdFSProbe Pinger: echoProbe perNFDGS: periodicProbe, runs General Status probe periodically
genericCLI -p Pinger -c 100 genericCLI -p Pinger -t all genericCLI-p NFDRIB genericCLI -p NFDGeneralStatus genericCLI -p NFDGeneralStatus -a all genericCLI -p perNFDGS -a <period_in-milliseconds>
The perNFDGS probe requests the NFDGeneralStatus at the period intervals five times then exits. This is done from the Probe, not the Client, which has already exited so output is currently to the NOD standard output, nothing elegant but a stub for future work.
A black hole client can be used to multicast measurement requests to non-local NODs. The specific usage is to report on whether the NOD has a prefix in its FIB or not.
bhClient -p <prefix>
Clients issue commands which should have ten name components appended to one or more components that identify the local network, and an empty data field. (Eventually, some of these components will go away but they are useful for debugging readability.)
|targetType||nod only current target type|
|nodSpec||ids target NODs, e.g. all, local, identity|
|roleType||operator, user, or guest|
|origin||the publications origin's network-attached device|
|commandType||probe (may be others in future)|
|probeArgs||e.g., NFibEntries, may be empty|
|timestamp||current UTC at Client|
NODs reply to commands with fifteen name components appended to the local network components and (usually) data. Most of the fields come directly from the associated command.
|commandID||and exact copy of command's last seven components|
|dCnt||indicates number of Data packets of reply|
|replyID||a nod identity|
|timestamp||current UTC at NOD|