Srinivasan Seetharaman - College of Computing, Georgia Tech

Slides:



Advertisements
Similar presentations
An Integrated, Distributed Traffic Control Strategy for Future Internet An Integrated, Distributed Traffic Control Strategy for Future Internet H. Che.
Advertisements

Responsive Yet Stable Traffic Engineering Srikanth Kandula Dina Katabi, Bruce Davie, and Anna Charny.
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Optimal Capacity Sharing of Networks with Multiple Overlays Zheng Ma, Jiang Chen, Yang Richard Yang and Arvind Krishnamurthy Yale University University.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Price Of Anarchy: Routing
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Achieving Network Optima Using Stackelberg Routing Strategies Yannis A. Korilis, Member, IEEE Aurel A. Lazar, Fellow, IEEE & Ariel Orda, Member IEEE IEEE/ACM.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Yashar Ganjali, and Abtin Keshavarzian Presented by: Isaac Keslassy Computer Systems Laboratory Department of Electrical Engineering Stanford University.
Building a Controlled Delay Assured Forwarding Class in DiffServ Networks Parag Kulkarni Nazeeruddin Mohammad Sally McClean Gerard Parr Michaela Black.
Traffic Matrix Estimation: Existing Techniques and New Directions A. Medina (Sprint Labs, Boston University), N. Taft (Sprint Labs), K. Salamatian (University.
Dynamic routing – QoS routing Load sensitive routing QoS routing.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
On the Interaction between Dynamic Routing in the Native and Overlay Layers INFOCOM 2006 Srinivasan Seetharaman Mostafa Ammar College of Computing Georgia.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
1 Transport BW Allocation, and Review of Network Routing 11/2/2009.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Interaction of Overlay Networks: Properties and Implications Joe W.J. Jiang Dah-Ming Chiu John C.S. Lui The Chinese University of Hong Kong.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Fast recovery in IP networks using Multiple Routing Configurations Amund Kvalbein Simula Research Laboratory.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
ICNP 2006 Inter­domain Policy Violations in Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College of Computing.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Routing in Multi-Layered Networks Srinivasan Seetharaman Georgia Institute of Technology Case Western Reserve University March 2007.
Overlay Networking Srinivasan Seetharaman Fall 2006.
Network Computing Laboratory Load Balancing and Stability Issues in Algorithms for Service Composition Bhaskaran Raman & Randy H.Katz U.C Berkeley INFOCOM.
GLOBECOM 2007 Exit Policy Violations in Multi-hop Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College.
System & Network Reading Group On Selfish Routing In Internet-Like Evironments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 On the Interaction between Dynamic Routing in the Native and Overlay Layers Infocom2006 Srinivasan Seetharaman and Mostafa Ammar College of Computing.
Xin Li, Chen Qian University of Kentucky
Impact of Interference on Multi-hop Wireless Network Performance
Confluent vs. Splittable Flows
Analyzing Cross-layer Interaction in Overlay Networks
Computing and Compressive Sensing in Wireless Sensor Networks
ECE 544: Traffic engineering (supplement)
Traffic Engineering with AIMD in MPLS Networks
ElasticTree Michael Fruchtman.
Overlay­Friendly Native Network: A Contradiction in Terms?
ISP and Egress Path Selection for Multihomed Networks
Colorado School of Mines
Multi-hop Coflow Routing and Scheduling in Data Centers
COS 561: Advanced Computer Networks
Routing in Multiple Layers: Opportunities and Challenges
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
Synthesis of SISO Controllers
Cross-Layer Interaction in Overlay Networks
An Optimization Problem in Adaptive Virtual Environments
An Empirical Evaluation of Wide-Area Internet Bottlenecks
Horizon: Balancing TCP over multiple paths in wireless mesh networks
Authors: Jinliang Fan and Mostafa H. Ammar
Towards Predictable Datacenter Networks
Presentation transcript:

Preemptive Strategies to Improve Routing Performance of Native and Overlay Layers Srinivasan Seetharaman - College of Computing, Georgia Tech Volker Hilt - Multimedia Networking, Bell Labs Markus Hofmann - Multimedia Networking, Bell Labs Mostafa Ammar - College of Computing, Georgia Tech

Multi-Layer Interaction Service overlay networks offer enhanced services by forming a virtual network of specialized nodes They deploy independent routing schemes that are oblivious to underlying native network achieve a specific selfish objective Two main problems: Mismatch of routing objectives Misdirection of traffic matrix estimation

Repeated Game Model Player1: Overlay Routing (OR) Latency-optimized paths between nodes Reacts to changes in link latency by probing periodically, without concern for bandwidth Player2: Traffic Engineering (TE) MPLS-based scheme that solves a linear program (using GNU LP kit) to obtain optimal multi-paths using traffic matrix as input Minimize [ Max util = MaxaE ( Xa/Ca ) ]

Repeated Game model (contd.) Overlay Routing Overlay Link Latencies Overlay routes  Overlay layer traffic Native link delays  Traffic on each overlay link The frequency of looping depends on the probing mechanism Traffic Engineering Native routes  Background traffic Traffic Matrix

Illustration of OR vs TE 14ms C Shortest latency routes A 4ms 4ms B 5ms 10ms D OVERLAY 23ms NATIVE 2 E F 4 10ms 2ms C 3 3 4 2ms 4 3 Minimize (Max util) 2ms 2ms Numbers on each link represent the avail-bw 2ms 3ms A B 5 G H 4ms 2 2 3 3 3ms 3ms 6ms 2ms I 2 J 2 D 10ms 10ms Initial State

Illustration of OR vs TE (contd.) 14ms C Multihop paths A  B  C A  B  D A 6ms 4ms B 5ms 10ms D OVERLAY 23ms NATIVE 2 E F 4 10ms 2ms C 4 2ms 2 2 2ms 2ms 2ms 3ms A B 1 G H 4ms 2 2 1 2 6ms 3ms 3ms 2ms I 2 J 2 D 10ms 10ms Overlay traffic introduced Avail-bw changed

Illustration of OR vs TE (contd.) 14ms C Multihop paths A  B  C A  B  D A 4ms 5ms B 5ms 10ms D OVERLAY 23ms NATIVE 2 E F 2 10ms 2ms C 1 1 2 2ms 2ms 4 2 2ms 2ms 3ms SPLIT A B 3 G H 4ms 1 1 1 2 3ms 3ms 6ms 2ms I 2 J 2 D 10ms 10ms Latency changed After TE reacts

Illustration of OR vs TE (contd.) 14ms C Multihop paths A  B  C A  B  C  D B  C  D A 4ms 5ms B 5ms 10ms D OVERLAY 23ms NATIVE 2 E F 10ms 2ms C 1 1 4 2ms 2ms 2ms 2ms 3ms Traffic going from node A to D cannot be split into components that go to C and that which goes to D SPLIT A B 5 G H 4ms 1 1 3 3ms 6ms 3ms 2ms I 2 J 2 D 10ms 10ms After Overlay routing reacts Avail-bw changed

Simulation Results TE objective Overlay objective Overall stability Round Clear conflict Duration of suboptimality is longer for TE Lot of oscillations observed

Past research [Qiu-Sigcomm03] conducted a simulation study of scenarios where there is a conflict of objectives [Liu-Infocom05] analyzed the interaction between OR and TE to show existence of Nash equilibrium General conclusion: The system suffers from prolonged route oscillations and sub-optimal routing costs

Our goal .. is to propose strategies that obtain the best possible performance for a particular layer while steering the system towards a stable state.

Resolving Conflict – Basic Idea Designate leader / follower Leader will act after predicting or counteracting the subsequent reaction of the follower Similar to the Stackelberg approach

Resolving Conflict - Obstacles Incomplete information Unavailable relation between the objectives NP-hard prediction

Resolving Conflict - Simplification Assume: Each layer has a general notion of the other layer’s selfish objective Operate leader such that Follower has no desire to change  Friendly Follower has no alternative to pick  Hostile Constitutes a preemptive action Use history to learn desired action gradually. Follower is forced

Overlay Strategy - Friendly Native layer only sees a set of src-dest demands Improve latency of overlay routes, while retaining the same load pressure on the native network! Load-constrained LP C Overlay link Traffic (Mbps) A ® B A ® C 1 B ® C 2 E 1 B 1 D A

Overlay Strategy – Friendly (contd.) Acceptable to both OR and TE Stable within a few rounds

Overlay Strategy - Hostile Push TE to such an extent that it does not reroute the overlay links after overlay routing Send dummy traffic in an effort to render TE ineffective Dummy traffic injection C E 1 Unused overlay link AB B 1 D A - Unused by real overlay traffic - Non-overlapping with overlay links under use

Overlay Strategy - Hostile (contd.) TE can’t improve further Acceptable only to OR

Native Strategy - Friendly TE pays no attention to the length of the route! TE should balance load, while ensuring that the path length is almost the same! Hopcount-constrained LP Native route Next hop Total Hops A ® B E 2 A ® C D D ® E B All others Dest itself 1 C E 1 B 1 D A

Native Strategy - Friendly (contd.) Acceptable to both OR and TE Takes a bit longer to converge

Native Strategy - Hostile Dissuade overlay routing from using certain multihop paths Increase latency of native links that are heavily loaded, without any knowledge of overlay networks Load-based latency tuning Overused native link C E 1 1 B 1 D A

Native Strategy - Hostile (contd.) Disrupted overlay routing Takes a bit longer to converge

Preemptive Strategies: Summary We proposed four strategies that improve performance for one layer and achieve a stable operating point Inflation factor = Steady state obj value with strategy Best obj value achieved Inflation Leader Strategy Overlay TE Friendly: Load-constrained LP Hostile: Dummy traffic injection 1.082 1.023 1.122 1.992 Native Friendly: Hopcount-constrained LP Hostile: Load-based Latency tuning 1.027 1.938 1.184 1.072

Preemptive Strategies: Summary (contd.) Each strategy achieves best performance for the target layer within a few rounds with no interface between the two layers with all information inferred through simple measurements If both layers deploy preemptive strategies, the performance of each layer depends on the other layer’s strategy.