Dogu Arifler and Brian L. Evans

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Interconnection Networks: Flow Control and Microarchitecture.
Mobile IPv6. Why study Mobility in IPv6? What is so different about Mobile IPv6 ?
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Leveraging Multiple Network Interfaces for Improved TCP Throughput Sridhar Machiraju, Prof. Randy Katz.
Passive Inference of Path Correlation Lili Wang, James N. Griffioen, Kenneth L. Calvert, Sherlia Shi Laboratory for Advanced Networking University of Kentucky.
Traffic Engineering With Traditional IP Routing Protocols
 Don Towsley 2000 Network Tomography for the Internet: Open Problems D. Towsley U. Massachusetts.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Leveraging Multiple Network Interfaces for Improved TCP Throughput Sridhar Machiraju SAHARA Retreat, June 10-12, 2002.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
Measurement and Monitoring Nick Feamster Georgia Tech.
FTDCS 2003 Network Tomography based Unresponsive Flow Detection and Control Authors Ahsan Habib, Bharat Bhragava Presenter Mohamed.
End-to-End Issues. Route Diversity  Load balancing o Per packet splitting o Per flow splitting  Spill over  Route change o Failure o policy  Route.
Capacity planning for web sites. Promoting a web site Thoughts on increasing web site traffic but… Two possible scenarios…
Inline Path Characteristic Estimation to Improve TCP Performance in High Bandwidth-Delay Networks HIDEyuki Shimonishi Takayuki Hama Tutomu Murase Cesar.
Multipath Routing CS 522 F2003 Beaux Sharifi. Agenda Description of Multipath Routing Necessity of Multipath Routing 3 Major Components Necessary for.
1 Confidence Intervals for Means. 2 When the sample size n< 30 case1-1. the underlying distribution is normal with known variance case1-2. the underlying.
A Scalable, Commodity Data Center Network Architecture.
On the Characteristics and Origins of Internet Flow Rates ACM SIGCOMM 2002 Yin Zhang Lee Breslau Vern Paxson Scott Shenker AT&T Labs – Research
Lawrence G. Roberts CEO Anagran September 2005 Enabling Data-Intensive iGrid Applications with Advanced Network Technology.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Detail: Reducing the Flow Completion Time Tail in Datacenter Networks SIGCOMM PIGGY.
École Polytechnique Fédérale de Lausanne Network Tomography on Correlated Links Denisa Ghita Katerina Argyraki Patrick Thiran IMC 2010, Melbourne, Australia.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
Spatio-Temporal Compressive Sensing Yin Zhang The University of Texas at Austin Joint work with Matthew Roughan.
Measurement and Modeling of Packet Loss in the Internet Maya Yajnik.
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Normal Distribution.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
On the Characteristics and Origins of Internet Flow Rates ACM SIGCOMM 2002 ICIR AT&T Labs – Research
1 Capacity Dimensioning Based on Traffic Measurement in the Internet Kazumine Osaka University Shingo Ata (Osaka City Univ.)
Network Tomography Based on Flow Level Measurements Dogu Arifler, Gustavo de Veciana, and Brian L. Evans The University of Texas at Austin IEEE International.
Network Tomography Based on Flow Level Measurements Dogu Arifler Ph.D. Defense Committee Members: Prof. Ross Baldick Prof. Melba M. Crawford Prof. Gustavo.
HELSINKI UNIVERSITY OF TECHNOLOGY Visa Holopainen 1/18.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
1/12 WiSE: A Novel Efficient Transport Protocol for Wireless Networks Roberta Fracchia Joint work with C. Casetti, C. Chiasserini, M. Meo.
Network Anomography Yin Zhang Joint work with Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Quantifying Uncertainty
Bandwidth estimation: metrics, measurement techniques, and tools Presenter: Yuhang Wang.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Configuration for routing example
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
Congestion Control in Data Networks and Internets
Chapter 9 Optimizing Network Performance
Architecture and Algorithms for an IEEE 802
Computer Data Security & Privacy
Hyuk Lim, Chaegwon Lim, Jennifer C. Hou Department of Computer Science
Muhammad Murtaza Yousaf, Michael Welzl
Ad-hoc Transport Layer Protocol (ATCP)
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Quantifying uncertainty using the bootstrap
Notices of the AMS, September 1998
© 2006 ITT Educational Services Inc.
Congestion Control (from Chapter 05)
Performance Evaluation of Computer Networks
Performance Evaluation of Computer Networks
pathChirp Efficient Available Bandwidth Estimation
Congestion Control (from Chapter 05)
pathChirp Efficient Available Bandwidth Estimation
Presentation transcript:

Factor Analysis of Network Flow Throughput Measurements for Inferring Congestion Sharing Dogu Arifler and Brian L. Evans Eastern Mediterranean University - The University of Texas at Austin European Signal Processing Conference Antalya, Turkey, September 4-8, 2005 http://www.emu.edu.tr http://www.ece.utexas.edu

Inference of congested path sharing Motivation: Network managers need information about resource sharing in other networks to better plan for services and diagnose performance problems Internet service providers need to diagnose configuration errors and link failures in peer networks Content providers need to balance workload and plan cache placement Problem: In general, properties of networks outside one’s administrative domain are unknown Little or no information on routing, topology, or link utilizations Solution: Network tomography Inferring characteristics of networks from available network traffic measurements

Autoregressive model for available capacity time available capacity TCP flow 1 TCP flow 2 Duration of f1=20 overlap time Throughput Correlation Throughputs of TCP flows that temporally overlap at a congested resource are correlated Removing large- and small-sized flows helps in capturing positive throughput correlations due to resource sharing high correlation for temporally overlapping flows Start time of f2

Measured data: component variances Use 4 flow classes: AOL1, AOL2, HotMail1, and Hotmail2 Filter flow records based on Packets: Discard flows consisting of only 1 packet Duration: Discard flows with duration shorter than 1 second Size: Discard flows with sizes < 8 kB or > 64 kB Normalized component variances: 2 significant components with explanatory power of 72% for Dataset2002 and 63% for Dataset2004 Principal component Dataset2002 95% confidence interval Dataset2004 1 (1.5457, 1.7900) (1.3646, 1.4786) 2 (1.0861, 1.3206) (1.0237, 1.1603) 3 (0.7058, 0.9150) (0.8230, 0.9690) 4 (0.2194, 0.4458) (0.5413, 0.6379)

Measured data: factor analysis Based on 2 significant components, determine factor loadings Rotated factor loading estimates: Rows correspond to classes Columns correspond to shared infrastructure Estimate 95% bootstrap confidence intervals for loadings to establish accuracy† With 95% confidence, we can identify which flow classes share infrastructure! Dataset2002 Dataset2004 AOL1 AOL2 HotMail1 Hotmail2 AOL1 AOL2 HotMail1 Hotmail2 † D. Arifler, Network Tomography Based on Flow Level Measurements, Ph.D. Dissertation, 2004.