Machine Learning for Routing During Congestion Events Kurtis Heimerl.

Slides:



Advertisements
Similar presentations
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Advertisements

Haga clic para modificar el estilo de subtítulo del patrón © 2012 – Teldat GmbH – All rights reserved „Port Based Security“ – „Drop-In-Mode“ The ideal.
Dual Homing Experiment Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
Topological Hole Detection Ritesh Maheshwari CSE 590.
TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina 6.033, Spring 2014.
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP Presented by Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
NETWORK LOAD BALANCING NLB.  Network Load Balancing (NLB) is a Clustering Technology.  Windows Based. (windows server).  To scale performance, Network.
Nick McKeown CS244 Lecture 6 Packet Switches. What you said The very premise of the paper was a bit of an eye- opener for me, for previously I had never.
High Performance Router Architectures for Network- based Computing By Dr. Timothy Mark Pinkston University of South California Computer Engineering Division.
Networks: Congestion Control1 Congestion Control.
Switching When we have a lot of devices that want to communicate, how do we set up connections between them?
Network based System on Chip Part A Performed by: Medvedev Alexey Supervisor: Walter Isaschar (Zigmond) Winter-Spring 2006.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
CS 268: Lecture 8 (Router Support for Congestion Control) Ion Stoica February 19, 2002.
Decongestion Control Offense by James Gross Amit Mondal.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
ACN: Congestion Control1 Congestion Control and Resource Allocation.
Networking Components Chad Benedict – LTEC
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
Problem Analysis and Structure II Multi-frame problems.
Chapter 4: Managing LAN Traffic
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
THIN CLIENT COMPUTING USING ANDROID CLIENT for XYZ School.
Common Devices Used In Computer Networks
COEN 252 Computer Forensics Collecting Network-based Evidence.
Simple Multihoming Experiment draft-huitema-multi6-experiment-00.txt Christian Huitema, Microsoft David Kessens, Nokia.
Link Scheduling & Queuing COS 461: Computer Networks
Congestion Control - Supplementary Slides are adapted on Jean Walrand’s Slides.
Lector: Aliyev H.U. Lecture №10 Multicast network software design TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT OF DATA COMMUNICATION.
Remote Controller & Presenter Make education more efficiently
Day11 Devices/LAN/WAN. Network Devices Hub Switches Bridge Router Gateway.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 5 Switches.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Improving TCP Performance over Wireless Networks
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
(C) J. M. Garrido1 Objects in a Simulation Model There are several objects in a simulation model The activate objects are instances of the classes that.
Section #7: Getting Data from Point A to Point B.
Statistics Collection Optimization Ideas. Existing Implementation: Statistics Manager sends following statistics request per switch/node Flow Statistics.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
The Difference Between Router and Switch Not everyone knows: ADVANTAGES OF SWITCH:  Switches offer higher performance than bridges and hubs.  Switches.
© 2006 Cisco Systems, Inc. All rights reserved. 3.2: Implementing QoS.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Advanced Network Tap application for
Now you don’t need to take any stress about the Cisco Exam
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Chapter 4 Data Link Layer Switching
System-on-Chip Design On-Chip Buses
Chapter 5: Inter-VLAN Routing
Virtual LANs.
Records Required By ISO 9001:2000
Data collection methodology and NM paradigms
Packet Switched Networks (Chapter 11.1) by Beverley Louis
CS703 – Advanced Operating Systems
How To Configure Hotspot in Virtual Mikrotik on VMware
Congestion Control Reasons:
TCP Congestion Control
Communication Networks NETW 501 Tutorial 4
Introduction to Packet Scheduling
In-network computation
Records Required By ISO 9001:2000
Introduction to Packet Scheduling
Presentation transcript:

Machine Learning for Routing During Congestion Events Kurtis Heimerl

Objectives Congestion Events- Congestion Events are when a router has a saturated out port. This port must drop some packets, as more are entering than exiting. Solution- Use machine learning to determine “important” packets. Route these packets at a higher priority, dropping other, less important packets. Use active testing and killing of services to do the above determination

Current Events Existing solutions to saturated line- Random FIFO packet dropping Advantages- Efficient Problems- Important services are not protected. Other services depend on these, causing unnecessary outages. Examples including the recent Skype outage, and a few Amazon.com outages

Idea! Use machine learning to determine important services to protect. Active testing methodology Interrupt packet streams(TCP connections) to determine these dependencies Route based on the determinations of machine learning DHCP server should be given priority Hadoop master should also be given priority Time server should not Hadoop slave should not Attempt to maximize the number of leaves in the dependency graph we've developed

The Unknown Most of this is fairly simple... except- Can I accurately determine when a service is dead? May have to modify hadoop to die in a particularly easy to detect manner Does this generalize? Need concerted effort to ensure that I don't pick the test bed such that the results are meaningless

The Plan 1-2 Weeks Have virtualized switched network 2-3 Weeks Implement simple death detection in the virtual switch network 3-5 Weeks Implement the active testing and recording methodology 5-7 Weeks Gather data