Author: Yi Lu, Balaji Prabhakar Publisher: INFOCOM’09

Slides:



Advertisements
Similar presentations
Author: Chengchen, Bin Liu Publisher: International Conference on Computational Science and Engineering Presenter: Yun-Yan Chang Date: 2012/04/18 1.
Advertisements

Indexing DNA Sequences Using q-Grams
Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels IPSN 2011 Sean.
Symbiotic Scheduling for Shared Caches in Multi-Core Systems Using Memory Footprint Signature  Mrinmoy Ghosh  Ripal Nathuji Min Lee Karsten Schwan Hsien-Hsin.
A Memory-optimized Bloom Filter using An Additional Hashing Function Author: Mahmood Ahmadi, Stephan Wong Publisher: IEEE GLOBECOM 2008 Presenter: Yu-Ping.
New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
1 Blooming Trees: Space-Efficient Structures for Data Representation Author: Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci Publisher:
Multi-Label Prediction via Compressed Sensing By Daniel Hsu, Sham M. Kakade, John Langford, Tong Zhang (NIPS 2009) Presented by: Lingbo Li ECE, Duke University.
Author: Nan Hua, Bill Lin, Jun (Jim) Xu, Haiquan (Chuck) Zhao Publisher: ANCS’08 Presenter: Yun-Yan Chang Date:2011/02/23 1.
Estimating TCP Latency Approximately with Passive Measurements Sriharsha Gangam, Jaideep Chandrashekar, Ítalo Cunha, Jim Kurose.
Author: Francis Chang, Wu-chang Feng, Kang Li Publisher: INFOCOM 2004 Presenter: Yun-Yan Chang Date: 2010/12/01 1.
Hit or Miss ? !!!.  Cache RAM is high-speed memory (usually SRAM).  The Cache stores frequently requested data.  If the CPU needs data, it will check.
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
1 Design of Bloom Filter Array for Network Anomaly Detection Author: Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci Publisher: IEEE GLOBECOM 2006 Presenter:
Sharing Aggregate Computation for Distributed Queries Ryan Huebsch, UC Berkeley Minos Garofalakis, Yahoo! Research † Joe Hellerstein, UC Berkeley Ion Stoica,
Ph.D. SeminarUniversity of Alberta1 Approximation Algorithms for Frequency Related Query Processing on Streaming Data Presented by Fan Deng Supervisor:
Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines By F. Bonomi et al. Presented by Kenny Cheng, Tonny Mak Yui Kuen.
1 Memory-Efficient 5D Packet Classification At 40 Gbps Authors: Ioannis Papaefstathiou, and Vassilis Papaefstathiou Publisher: IEEE INFOCOM 2007 Presenter:
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
Towards a High-speed Router-based Anomaly/Intrusion Detection System (HRAID) Zhichun Li, Yan Gao, Yan Chen Northwestern.
1 Counter Braids A novel counter architecture for network measurement.
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Sensor Networks Storage Sanket Totala Sudarshan Jagannathan.
Fast and deterministic hash table lookup using discriminative bloom filters  Author: Kun Huang, Gaogang Xie,  Publisher: 2013 ELSEVIER Journal of Network.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Authors: Yi Wang, Tian Pan, Zhian Mi, Huichen Dai, Xiaoyu Guo, Ting Zhang, Bin Liu, and Qunfeng Dong Publisher: INFOCOM 2013 mini Presenter: Chai-Yi Chu.
CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon (Technion, Israel) Joint work with Iddo Hanniel and Isaac Keslassy ( Technion ) 1.
Sujayyendhiren RS, Kaiqi Xiong and Minseok Kwon Rochester Institute of Technology Motivation Experimental Setup in ProtoGENI Conclusions and Future Work.
CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon Joint work with Iddo Hanniel and Isaac Keslassy Technion, Israel 1.
Author: Haoyu Song, Fang Hao, Murali Kodialam, T.V. Lakshman Publisher: IEEE INFOCOM 2009 Presenter: Chin-Chung Pan Date: 2009/12/09.
Efficient Packet Classification with Digest Caches Francis Chang Wu-chang Feng Wu-chi Feng Kang Li.
Author: Sriram Ramabhadran, George Varghese Publisher: SIGMETRICS’03 Presenter: Yun-Yan Chang Date: 2010/12/29 1.
Author : Guangdeng Liao, Heeyeol Yu, Laxmi Bhuyan Publisher : Publisher : DAC'10 Presenter : Jo-Ning Yu Date : 2010/10/06.
A Formal Analysis of Conservative Update Based Approximate Counting Gil Einziger and Roy Freidman Technion, Haifa.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
1 A Throughput-Efficient Packet Classifier with n Bloom filters Authors: Heeyeol Yu and Rabi Mahapatra Publisher: IEEE GLOBECOM 2008 proceedings Present:
The Bloom Paradox Ori Rottenstreich Joint work with Yossi Kanizo and Isaac Keslassy Technion, Israel.
Author: Heeyeol Yu and Rabi Mahapatra
Author : Sarang Dharmapurikar, John Lockwood Publisher : IEEE Journal on Selected Areas in Communications, 2006 Presenter : Jo-Ning Yu Date : 2010/12/29.
The Bloom Paradox Ori Rottenstreich Joint work with Isaac Keslassy Technion, Israel.
Author: Haoyu Song, Murali Kodialam, Fang Hao and T.V. Lakshman Publisher/Conf. : IEEE International Conference on Network Protocols (ICNP), 2009 Speaker:
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
1 Efficient System-on-Chip Energy Management with a Segmented Counting Bloom Filter Mrinmoy Ghosh- Georgia Tech Emre Özer- ARM Ltd Stuart Biles- ARM Ltd.
Tracking Millions of Flows In High Speed Networks for Application Identification Tian Pan, Xiaoyu Guo, Chenhui Zhang, Junchen Jiang, Hao Wu and Bin Liut.
Noise Can Help: Accurate and Efficient Per-flow Latency Measurement without Packet Probing and Time Stamping Michigan State University SIGMETRICS 14.
Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing Zhidan Liu, Zhenjiang Li, Mo Li, Wei Xing, Dongming Lu Zhejiang University,
Refined Online Citation Matching and Adaptive Canonical Metadata Construction CSE 598B Course Project Report Huajing Li.
Packet Classification Using Dynamically Generated Decision Trees
Evaluating and Optimizing IP Lookup on Many Core Processors Author: Peng He, Hongtao Guan, Gaogang Xie and Kav´e Salamatian Publisher: International Conference.
Duplicate Detection in Click Streams(2005) SubtitleAhmed Metwally Divyakant Agrawal Amr El Abbadi Tian Wang.
SCREAM: Sketch Resource Allocation for Software-defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat (CoNEXT’15)
Scalable Multi-match Packet Classification Using TCAM and SRAM Author: Yu-Chieh Cheng, Pi-Chung Wang Publisher: IEEE Transactions on Computers (2015) Presenter:
SketchVisor: Robust Network Measurement for Software Packet Processing
Counting bloom filters for pattern matching and anti-evasion at the wire speed Author: Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi,
Author: Heeyeol Yu; Mahapatra, R.; Publisher: IEEE INFOCOM 2008
Updating SF-Tree Speaker: Ho Wai Shing.
The Variable-Increment Counting Bloom Filter
Toward Advocacy-Free Evaluation of Packet Classification Algorithms
Rate 7/8 (1344,1176) LDPC code Date: Authors:
EEC-484/584 Computer Networks
Bloom Filters Very fast set membership. Is x in S? False Positive
SCREAM: Sketch Resource Allocation for Software-defined Measurement
Persistent Bloom Filter: Membership Testing for the Entire History
Packet Classification Using Coarse-Grained Tuple Spaces
Lecture 1: Bloom Filters
Lu Tang , Qun Huang, Patrick P. C. Lee
A Hybrid IP Lookup Architecture with Fast Updates
An index-split Bloom filter for deep packet inspection
Author: Ramana Rao Kompella, Kirill Levchenko, Alex C
Presentation transcript:

Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture Author: Yi Lu, Balaji Prabhakar Publisher: INFOCOM’09 Presenter: Yun-Yan Chang Date: 2011/11/2

Outline Previous work Space-efficient approximate flow label collection Error-resilient message passing decoder Evaluation

Previous work Counter braids : 2 : 24 : 3 : 2 : 1 : 3

Previous work Standard Bloom Filter (SBF) A m-bit vector B Use k hash functions h1(.),…, hk(.) Insert: Set the h1(x)th, …, h1(x)th bit of bit-vector to “1”. Bloom filter with Variable-length Signature (VBF) Insert: set t (k) bits to “1”. Query: a flow is valid if at least q (k) bits are set to “1” in bit-vecotr B. Delete: unset kd bits of a flow’s signature (d < q)

Space-efficient approximate flow label collection Problem Collect the flow labels for each measurement epoch. Memory resource constrains of recording flow labels. Approximate solution Identify flows by VLSC (variable-length signature counting) Bloom filters in SRAM. Store the flow labels in off-chip DRAM.

Space-efficient approximate flow label collection Flowchart All collected flow labels are stored in DRAM. BF1: identify TCP flows. BF2: identify non-TCP flows. Three paths to DRAM Corresponds to a TCP “SYN” packet, recorded in DRAM directly and insert to BF1. Corresponds to TCP packets that is not “SYN”. Corresponds to non-TCP packets. Fig. 4. Flow label collection using VLSC Bloom filters

Space-efficient approximate flow label collection Problem when decoding: Missing flow labels Result from packets of a flow being false positives in BF1. Cause a problem when decoding. Fig. 3. Layer-1 decoding graph with missing flow labels. The top figure shows the actual flows and corresponding counts, with dashed lines indicating contribution from the missing flow. The bottom figure shows the actual decoding graph and noise in counters due to the missing flow.

Error-resilient message passing decoder To decode when some flow labels are missing. Algorithm

Iteration 3 Iteration 2 Iteration 1 Initialize flow node i counter node a μ11(3) = max{c1-0,1} = 1 μ21(3) = max{c2- ν22(2), 1} = 1 μ22(3) = max{c2- ν12(2), 1} = 32 μ31(3) = max{c3- ν23(2), 1} = 3 μ32(3) = max{c3- ν13(2), 1} = 34 μ42(3) = max{c4- 0, 1} = 32 μ11(1) = max{c1-0,1} = 1 μ21(1) = max{c2- ν22(0), 1} = 33 μ22(1) = max{c2- ν12(0), 1} = 33 μ31(1) = max{c3- ν23(0), 1} = 35 μ32(1) = max{c3- ν13(0), 1} = 35 μ42(1) = max{c4- 0, 1} = 32 μ11(2) = max{c1-0,1} = 1 μ21(2) = max{c2- ν22(1), 1} = 1 μ22(2) = max{c2- ν12(1), 1} = 32 μ31(2) = max{c3- ν23(1), 1} = 3 μ32(2) = max{c3- ν13(1), 1} = 34 μ42(2) = max{c4- 0, 1} = 32 Iteration 3 Iteration 2 Iteration 1 Initialize μ11 μ21 μ22 μ31 μ32 μ42 c 1 = 1 c 2 = 33 c 3 = 35 c 4 = 32 ν11 ν12 ν13 ν22 ν23 ν24 v11 (2) = min{μ21(2), μ31(2)} = 1 v12(2) = min {μ11(2), μ31(2)} = 1 v13(2) = min {μ11(2), μ21(2)} = 1 v22 (2) = min {μ32(2), μ42(2)} = 32 v23 (2) = min {μ22(2), μ42(2)} = 32 v24 (2) = min {μ22(2), μ32(2)} = 32 v11 (1) = min{μ21(1), μ31(1)} = 33 v12(1) = min {μ11(1), μ31(1)} = 1 v13(1) = min {μ11(1), μ21(1)} = 1 v22 (1) = min {μ32(1), μ42(1)} = 32 v23 (1) = min {μ22(1), μ42(1)} = 32 v24 (1) = min {μ22(1), μ32(1)} = 33

Iteration 2 Iteration 1 Iteration 3 Initialize flow node i counter node a μ11(3) = max{c1-0,1} = 1 μ21(3) = max{c2- ν22(2), 1} = 1 μ22(3) = max{c2- ν12(2), 1} = 30 μ31(3) = max{c3- ν23(2), 1} = 3 μ32(3) = max{c3- ν13(2), 1} = 34 μ42(3) = max{c4- 0, 1} = 32 μ11(2) = max{c1-0,1} = 1 μ21(2) = max{c2- ν22(1), 1} = 1 μ22(2) = max{c2- ν12(1), 1} = 32 μ31(2) = max{c3- ν23(1), 1} = 3 μ32(2) = max{c3- ν13(1), 1} = 34 μ42(2) = max{c4- 0, 1} = 32 μ11(1) = max{c1-0,1} = 1 μ21(1) = max{c2- ν22(0), 1} = 33 μ22(1) = max{c2- ν12(0), 1} = 33 μ31(1) = max{c3- ν23(0), 1} = 35 μ32(1) = max{c3- ν13(0), 1} = 35 μ42(1) = max{c4- 0, 1} = 32 Iteration 2 Iteration 1 Iteration 3 Initialize μ11 μ21 μ22 μ31 μ32 μ42 c 1 = 1 c 2 = 33 c 3 = 35 c 4 = 32 ν11 ν12 ν13 ν22 ν23 ν24 v11 (1) = min{μ21(1), μ31(1)} = 33 v12(1) = min {μ11(1), μ31(1)} = 1 v13(1) = min {μ11(1), μ21(1)} = 1 v22 (1) = min {μ32(1), μ42(1)} = 32 v23 (1) = min {μ22(1), μ42(1)} = 32 v24 (1) = min {μ22(1), μ32(1)} = 33 v11 (2) = max{μ21(2), μ31(2)} = 3 v12(2) = max {μ11(2), μ31(2)} = 3 v13(2) = max {μ11(2), μ21(2)} = 1 v22 (2) = max {μ32(2), μ42(2)} = 34 v23 (2) = max {μ22(2), μ42(2)} = 32 v24 (2) = max {μ22(2), μ32(2)} = 34

Evaluation Space-accuracy tradeoff of VLSC Bloom filters Trace file: 5 million packet CAIDA trace (collected at 9:10 am, Aug 14, 2002)

Perr: reconstruction Error Em: average error magnitude Evaluation

Perr: reconstruction Error Em: average error magnitude Evaluation