1 An Information Theoretic Approach to Network Trace Compression Y. Liu, D. Towsley, J. Weng and D. Goeckel.

Slides:



Advertisements
Similar presentations
New Packet Sampling Technique for Robust Flow Measurements Shigeo Shioda Department of Architecture and Urban Science Graduate School of Engineering, Chiba.
Advertisements

IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Evaluation of Header Field Entropy for Hash-Based Packet Selection Evaluation of Header Field Entropy for Hash-Based Packet Selection Christian Henke,
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
FLIP : Flexible Interconnection Protocol Ignacio Solis Katia Obraczka.
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
On the Constancy of Internet Path Properties Yin Zhang, Nick Duffield AT&T Labs Vern Paxson, Scott Shenker ACIRI Internet Measurement Workshop 2001 Presented.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
1 Distributed Online Simultaneous Fault Detection for Multiple Sensors Ram Rajagopal, Xuanlong Nguyen, Sinem Ergen, Pravin Varaiya EECS, University of.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
1 Application TCPUDP IPICMPARPRARP Physical network Application TCP/IP Protocol Suite.
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
Variance of Aggregated Web Traffic Robert Morris MIT Laboratory for Computer Science IEEE INFOCOM 2000’
Exploiting Packet Header Redundancy for Zero Cost Dissemination of Dynamic Resource Information Peter A. Dinda Prescience Lab Department of Computer Science.
Chapter 3 Review of Protocols And Packet Formats
ECE 526 – Network Processing Systems Design Packet Processing II: algorithms and data structures Chapter 5: D. E. Comer.
1 An Information-theoretic Approach to Network Measurement and Monitoring Yong Liu, Don Towsley, Tao Ye, Jean Bolot.
5/12/05CS118/Spring051 A Day in the Life of an HTTP Query 1.HTTP Brower application Socket interface 3.TCP 4.IP 5.Ethernet 2.DNS query 6.IP router 7.Running.
Transport Layer TCP and UDP IS250 Spring 2010
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
CS 218 F 2003 Nov 3 lecture:  Streaming video/audio  Adaptive encoding (eg, layered encoding)  TCP friendliness References: r J. Padhye, V.Firoiu, D.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
ECE 526 – Network Processing Systems Design Packet Processing I: algorithms and data structures Chapter 5: D. E. Comer.
Hung X. Nguyen and Matthew Roughan The University of Adelaide, Australia SAIL: Statistically Accurate Internet Loss Measurements.
Multimedia Data Introduction to Lossless Data Compression Dr Sandra I. Woolley Electronic, Electrical.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Internet Protocol Formats. IP (V4) Packet byte 0 byte1 byte 2 byte 3 data... – up to 65 K including heading info Version IHL Serv. Type Total Length Identifcation.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Decoding an IP Header (1)
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Samples of Descriptive Problems CSC/ECE 573, Sections 001 Fall, 2012.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
Wireless and mobility support issues Georgios Karagiannis Ericsson.
Introduction to TCP/IP networking. TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol TCP : Transmission Control Protocol.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 3 TCP and IP by Zornitza Genova Prodanoff.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Introduction to TCP/IP networking
Multiplexing.
Process-to-Process Delivery, TCP and UDP protocols
Internet Protocol Formats
Standards Basics.
EE 122: Lecture 18 (Differentiated Services)
Internet Protocol Formats
ECSE-4670: Computer Communication Networks (CCN)
Network-Wide Routing Oblivious Heavy Hitters
Review of Internet Protocols Transport Layer
Electrical Communications Systems ECE
Presentation transcript:

1 An Information Theoretic Approach to Network Trace Compression Y. Liu, D. Towsley, J. Weng and D. Goeckel

2 Outline  network monitoring/measurement  information theory & compression  single point trace compression  joint network trace compression  future work

3 Motivation  service providers, service users  monitoring  anomaly detection  debugging  traffic engineering  pricing, peering, service level agreements  architecture design  application design

4 Network of Network Sensors  network monitoring: sensing a network  embedded vs. exogenous  single point vs. distributed  different granularities  full traffic trace: packet headers  flow level record: timing, volume  summary statistics: byte/packet counts  challenges  growing scales: high speed link, large topology  constrained resources: processing, storage, transmission  30G headers/hour at UMass gateway  solutions  sampling: temporal/spatial  compression: marginal/distributed

5 Entropy & Compression (I)  Shannon entropy of discrete r.v.  compression of i.i.d. sequence by source coding  coding:  expected code length:  info. theoretic bound:  Shannon/Huffman coding  assign short codeword to frequent outcome  achieve the H(X) bound

6 Entropy & Compression (II)  joint entropy  entropy rate of stochastic process   exploit auto-correlation  lower bound on # bits per sample of X  compression ratio: H(X)/M, M – original size per sample  Lempel-Ziv Coding  asymptotically achieve entropy rate of stationary process  universal data compression algorithms: LZ77, gzip, winzip

7 Entropy & Compression (III)  joint entropy rate of set of stochastic processes  joint data compression  exploit cross-correlation between sources  joint compression ratio  Slepian-Wolf Coding  distributed compression: encode each process individually, achieve joint entropy rate in limit  require knowledge of cross-correlation structure

8 Network Trace Compression  naïve way: treat as byte stream, compress by generic tools  gzip compress UMass traces by a factor of 2  network traces are highly structured data  multiple fields per packet diversity in information richness correlation among fields  multiple packets per flow packets within a flow share information temporal correlation  multiple monitors traversed by a flow most fields unchanged within the network spatial correlation  network trace models  quantify information content of network traces  serves as lower bounds/guidelines for compression algorithms

9 Packet Header Trace source IP address destination IP address data sequence number acknowledgment number time stamp (sec.) time stamp (sub-sec.) total lengthToSvers.HLen IPIDflags TTLprotocolheader checksum destination portsource port window sizeHlen fragment offset TCP flags urgent pointerchecksum Timing IP Header TCP Header 01631

10 Header Field Entropy source IP address destination IP address data sequence number acknowledgment number time stamp (sec.) time stamp (sub-sec.) total lengthToSvers.HLen IPIDflags TTLprotocolheader checksum destination portsource port window sizeHlen fragment offset TCP flags urgent pointerchecksum Timing IP Header TCP Header Θ: flow id T: Time

11 Single Point Compression T0 Θ0Θ0 T1 Θ1Θ1 T3 Θ0Θ0 Tn ΘnΘn Tm Θ0Θ0  temporal correlation introduced by flows  packets from same flow closely spaced in time  they share header information  packet inter-arrival: # bits per packet: T0 Θ0Θ0 T3 Θ0Θ0 Tm Θ0Θ0  flow based trace:  flow record: Θ0Θ0 KT0 flow ID flow size arrival time packet inter-arrival  # bits per flow id: H( Θ )

12 Flow Level Model  Poisson flow arrival rate:  flow inter-arrival: independent packet inter-arrival: K – flow length  # bits per flow:  # bits per second:   H (Φ)  marginal compression ratio

13 Empirical Results: single point  1 hour UMass gateway traces  Sept. 22, 2004 to Oct. 23, 2004  1am, 10am, 1pm

14 Distributed Network Monitoring  single flow recorded by multiple monitors  spatial correlation: traces collected at distributed monitors are correlated  marginal node view: #bits/sec to represent flows seen by one node, bound on single point compression  network system view: #bits/sec to represent flows cross the network, bound on joint compression  joint compression ratio: quantify gain of joint compression

15 Baseline Joint Entropy Model  “perfect” network  fixed routes/constant link delay/no packet loss  flow classes based on routes  flows arrive with rate:  # of monitors traversed:  #bits per flow record:  info. rate at node v:  network view info. rate:  joint compression ratio:

16 Joint Trace Compression  Results from synthetic networks

17 Open Issues  how many more bits for network characteristics  variable delay/loss/route change  distributed compression algorithms  lossless v.s. lossy  joint routing and compression in trace aggregation

18 Future work  develop compression algorithms  single point compression  distributed joint compression  different levels of details  full packet traces  Netflow data  SNMP data  entropy based applications  network monitor placement  network anomaly detection

19 Questions & Comments  ???