Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.

Slides:



Advertisements
Similar presentations
Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
Advertisements

1 Locating Internet Bottlenecks: Algorithms, Measurement, and Implications Ningning Hu (CMU) Li Erran Li (Bell Lab) Zhuoqing Morley Mao (U. Mich) Peter.
User-level Internet Path Diagnosis Ratul Mahajan, Neil Spring, David Wetherall and Thomas Anderson Designed by Yao Zhao.
Path Optimization in Computer Networks Roman Ciloci.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Towards Unbiased End-to-End Network Diagnosis Name: Kwan Kai Chung Student ID: Date: 18/3/2007.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Small-world Overlay P2P Network
Lo Presti 1 Network Tomography Francesco Lo Presti Dipartimento di Informatica - Università dell’Aquila.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
Tomography-based Overlay Network Monitoring UC Berkeley Yan Chen, David Bindel, and Randy H. Katz.
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
NetQuest: A Flexible Framework for Internet Measurement Lili Qiu Joint work with Mike Dahlin, Harrick Vin, and Yin Zhang UT Austin.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
Internet Iso-bar: A Scalable Overlay Distance Monitoring System Yan Chen, Lili Qiu, Chris Overton and Randy H. Katz.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
Tomography-based Overlay Network Monitoring and its Applications Joint work with David Bindel, Brian Chavez, Hanhee Song, and Randy H. Katz UC Berkeley.
1 A Suite of Schemes for User-level Network Diagnosis without Infrastructure Yao Zhao, Yan Chen Lab for Internet and Security Technology, Northwestern.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring University of California at Berkeley David Bindel, Hanhee Song, and Randy H.
Tomography-based Overlay Network Monitoring UC Berkeley Yan Chen, David Bindel, and Randy H. Katz.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Tomography-based Overlay Network Monitoring and its Applications Joint work with David Bindel, Brian Chavez, Hanhee Song, and Randy H. Katz UC Berkeley.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
Network Tomography (A presentation for STAT 593E) Mingyan Li Radha Sampigethaya.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Tomography-based Overlay Network Monitoring Hugo Angelmar Slides courtesy of (Yan Chen, David Bindel, and Randy H. Katz)
Scalable and Deterministic Overlay Network Diagnosis Yao Zhao, Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
The Minimal Communication Cost of Gathering Correlated Data over Sensor Networks EL 736 Final Project Bo Zhang.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Advanced Networking Lab. Given two IP addresses, the estimation algorithm for the path and latency between them is as follows: Step 1: Map IP addresses.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
Paper Group: 20 Overlay Networks 2 nd March, 2004 Above papers are original works of respective authors, referenced here for academic purposes only Chetan.
Inference, monitoring and recovery of large scale networks CSE Department PennState University Institute for Networking and Security Research Faculty:
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
1 Network Tomography Using Passive End-to-End Measurements Venkata N. Padmanabhan Lili Qiu Helen J. Wang Microsoft Research DIMACS’2002.
Reliable Multicast Routing for Software-Defined Networks.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
NetQuest: A Flexible Framework for Large-Scale Network Measurement Lili Qiu University of Texas at Austin Joint work with Han Hee Song.
Network Coding Tomography for Network Failures
Network Computing Laboratory Load Balancing and Stability Issues in Algorithms for Service Composition Bhaskaran Raman & Randy H.Katz U.C Berkeley INFOCOM.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
Lo Presti 1 Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING Network.
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua University Tsinghua Univ. Oct Experimental Study on Neighbor Selection Policy.
1 Network Tomography Using Passive End-to-End Measurements Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang.
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Kapitel 19: Routing. Kapitel 21: Routing Protocols
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
Universal Opportunistic Routing Scheme using Network Coding
UbiCrawler: a scalable fully distributed Web crawler
Vivaldi: A Decentralized Network Coordinate System
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
ISP and Egress Path Selection for Multihomed Networks
ECE 544 Protocol Design Project 2016
End-user Based Network Measurement and Diagnosis
Presentation transcript:

Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC Berkeley

2 Outline Background and Motivation MILS in Undirected Graph MILS in Directed Graph Evaluation Conclusions

3 End-to-End Network Diagnosis 93 hours?

4 Linear Algebraic Model Path loss rate p i, link loss rate l j : A D C B p1p1 p2p2 Usually an underconstrained system

5 Unidentifiable Links Vectors That Are Linear Combinations of Row Vectors of G Are Identifiable –The property of a link (or link sequence) can be computed from the linear system if and only if the corresponding vector is identifiable Otherwise, Unidentifiable A D C B p1p1 p2p2 [ ] [ ] ?

6 Virtual Link Motivation Biased statistic assumptions are introduced to infer unidentifiable Links Loss rate = 0.1 if linear optimization Loss = 0 if unicast tomography & RED Loss rate?

7 Least-biased End-to-end Network Diagnosis (LEND) Basic Assumptions –End-to-end measurement can infer the end-to- end properties accurately –Link level properties are independent Problem Formulation –Given end-to-end measurements, what is the finest granularity of link properties can we achieve under basic assumptions? Basic assumptions More and stronger statistic assumptions Virtual link Diagnosis granularity? Better accuracy

8 Least-biased End-to-end Network Diagnosis (LEND) Contributions –Define the minimal identifiable unit under basic assumptions (MILS) –Prove that only E2E paths are MILS with a directed graph topology (e.g., the Internet) –Propose good path algorithm (incorporating measurement path properties) for finer MILS Basic assumptions More and stronger statistic assumptions Virtual link Diagnosis granularity? Better accuracy

9 Outline Background and Motivation MILS in Undirected Graph MILS in Directed Graph Evaluation Conclusions

10 Minimal Identifiable Link Sequence Definition of MILS –The smallest path segments with loss rates that can be uniquely identified through end- to-end path measurements –Related to the sparse basis problem NP-hard Problem Properties of MILS –The MILS is a consecutive sequence of links –A MILS cannot be split into MILSes (minimal) –MILSes may be linearly dependent, or some MILSes may contain other MILSes

11 Examples of MILSes in Undirected Graph Real links (solid) and all of the overlay paths (dotted) traversing them ’ 2’ 3’ 4’ 4 5 MILSes a b c d e 3’+2’-1’-4’ → link 3

12 Outline Background and Motivation MILS in Undirected Graph MILS in Directed Graph Evaluation Conclusions

13 Identify MILSes in Undirected Graphs Preparation –Active or passive end-to-end path measurement –Optimization Measure O(nlogn) paths and infer the n(n-1) end-to-end paths [SIGCOMM04]

14 Preparation Identify MILSes –Enumerate each link sequence to see if it is identifiable –Computational complexity: O( r × k × l 2 ) r: the number of paths (O(n 2 )) k: the rank of G (O(nlogn)) l: the length of the paths –Only takes 4.2 seconds for the network with 135 Planetlab hosts and 18,090 Internet paths Identify MILSes in Undirected Graphs

15 What about Directed Graphs? Directed Graph Are Essentially Different to Undirected Graph Theorem: In a directed graph, no end-to-end path contains an identifiable subpath if only considering topology information [ ] ? Sum=1 Sum=0

16 Good Path Algorithm Consider Only Topology –Works for undirected graph Incorporate Measurement Path Property –Most paths have no loss PlanetLab experiments show 50% of paths in the Internet have no loss –All the links in a path of no loss are good links (Good Path Algorithm)

17 Good Path Algorithm Symmetric Property is broken when using good path algorithm

18 Other Features of LEND Dynamic Update for Topology and Link Property Changes –End hosts join or leave, routing changes or path property changes –Incremental update algorithms very efficient Combine with Statistical Diagnosis –Inference with MILSes is equivalent to inference with the whole end-to-end paths –Reduce computational complexity because MILSes are shorter than paths Example: applying statistical tomography methods in [Infocom03] on MILSes is 5x faster than on paths

19 Outline Motivation MILS in Undirected Graph MILS in Directed Graph Evaluation Conclusions

20 Evaluation Metrics Diagnosis Granularity –Average length of all the lossy MILSes in lossy path Accuracy –Simulations Absolute error and relative error –Internet experiments Cross validation IP spoof based consistency check Speed –Running time for finding all MILSes and loss rate inference

21 Methodology Planetlab Testbed –135 end hosts, each from different institute –18,090 end-to-end paths Topology Measured by Traceroute –Avg path length is 15.2 Path Loss Rate by Active UDP Probing with Small Overhead Areas and Domains# of hosts US (77).edu50.org14.net2.com10.us1 Inter- national (58) Europe25 Asia25 Canada3 South America3 Australia2

22 Diagnosis Granularity # of End-to-end Paths18,090 Avg Path Length15.2 # of MILSes1009 Avg length of MILSes 2.3 virtual links (3.9 physical links) Avg diagnosis granularity 2.3 virtual links (3.8 physical links) Loss rate [0, 0.05) lossy path [0.05, 1.0] (15.8%) [0.05, 0.1)[0.1, 0.3)[0.3, 0.5)[0.5, 1.0)1.0 %

23 Distribution of Length of MILSes Most MILSes are pretty short Some MILSes are longer than 10 hops –Some paths do not overlap with any other paths Most MILSes are short A few MILSes are very long

24 Other Results MILS to AS Mapping –33.6% lossy MILSes comprise only one physical link 81.8% of them connect two ASes Accuracy –Cross validation (99.0%) –IP spoof based consistency check (93.5%) Speed –4.2 seconds for MILS computations –109.3 seconds for setup of scalable active monitoring [SIGCOMM04]

25 Conclusion Link-level property inference in directed graphs is completely different from that in undirected graphs With the least biased assumptions, LEND uses good path algorithm to infer link level loss rates, achieving –Good inference accuracy –Acceptable diagnosis granularity in practice –Online monitoring and diagnosis Continuous monitoring and diagnosis services on PlanetLab under construction

26 Thank You! For more info: Questions?

27

28 Motivation End-to-End Network Diagnosis Under-constrained Linear System –Unidentifiable Links exist To simplify presentation, assume undirected graph model A R B

29 Linear Algebraic Model (2) … =

30 Identifiable and Unidentifiable Vectors That Are Linear Combinations of Row Vectors of G Are Identifiable Otherwise, Unidentifiable A D C B p1p1 p2p2 (1,1,0) Row(path) space (identifiable) x1x1 x2x2 (1,1,1) (0,0,1) x3x3

31 Examples of MILSes in Undirected Graph ’ Real links (solid) and all of the overlay paths (dotted) traversing them 1’2’ ’ 2’ Rank(G)=1 Rank(G)=3 Rank(G)=4 3’ 4’ a 4 a b c 3’ 5 MILSes a b c d e 3’+2’-1’-4’ → link 3

32 Identify MILSes in Undirected Graphs Preparation Identify MILSes –Compute Q as the orthonormal basis of R (G T ) (saved by preparation step) –For a vector v in R (G T ), ||v|| = ||Q T v|| x1x1 x2x2 x3x3 v1v1 v2v2

33 Flowchart of LEND System Step 1 –Monitors O(n·logn) paths that can fully describe all the O(n 2 ) paths (SIGCOMM04) –Or passive monitoring Step 2 –Apply good path algorithm before identifying MILSes as in undirected graph Measure topology to get G Active or passive monitoring Iteratively check all possible MILSes Compute loss rates of MILSes Good path algorithm on G Stage 2: online update the measurements and diagnosis Stage 1: set up scalable monitoring system for diagnosis

34 Evaluation with Simulation Metrics –Diagnosis granularity Average length of all the lossy MILSes in lossy path (in the unit of link or virtual link) –Accuracy Absolute error |p – p’ |: Relative error

35 Simulation Methodology Topology type –Three types of BRITE router-level topologies –Mecator topology Topology size –1000 ~ or 284k nodes Number of end hosts on the overlay network –50 ~ 300 Link loss rate distribution –LLRD1 and LLRD2 models Loss model –Bernoulli and Gilbert

36 Sample of Simulation Results # of end host on OL # of paths Avg PL # of links # of LP # of links in LP Avg MILS length Avg diagnosis granularity (3.03)2.24(3.07) (2.27)2.05(2.95) (1.92)1.77(2.38) Mercator (284k nodes) with Gilbert loss model and LLRD1 loss distribution

37 Related Works Pure End-to-End Approaches –Internet Tomography Multicast or unicast with loss correlation – Uncorrelated end-to-end schemes Router Response Based Approach –Tulip and Cing

38 MILS to AS Mapping IP-to-AS mapping constructed from BGP routing tables Consider the short MILSes with length 1 or 2 –Consist of about 44% of all lossy MILSes. –Most lossy links are connecting two dierent ASes 1 AS2 ASes3 ASes>3 ASes Len 1 MILSes (33.6%)6.1%27.5%00 Len 2 MILSes (9.8%)2.6%5.8%1.3%0 Len > 2 MILSes (56.6%)6.8%17.8%21.8%10.2%

39 Accuracy Validation Cross Validation (99.0% consistent) IP Spoof based Consistency Checking. UDP: Src: A, Dst: C, TTL=255 A C B UDP: Src: A, Dst: B, TTL=255UDP: Src: C, Dst: B, TTL=2ICMP: Src: R 3, Dst: C, TTL=255 R1R1 R2R2 R3R3 IP Spoof based Consistency: 93.5%