Difficulties in Simulating the Internet Sally Floyd, Senior Member, IEEE, and Vern Paxson IEEE/ACM Transactions on Networking, August 2001 Mingyu Sun Instructor:

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

COS 461 Fall 1997 Networks and Protocols u networks and protocols –definitions –motivation –history u protocol hierarchy –reasons for layering –quick tour.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Network Congestion Gabriel Nell UC Berkeley. Outline Background: what is congestion? Congestion control – End-to-end – Router-based Economic insights.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Term Projects Shiv Kalyanaraman, Rensselaer Polytechnic Institute
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
Chapter 1 Read (again) chapter 1.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
E2E Routing Behavior in the Internet Vern Paxson Sigcomm 1996 Slides are adopted from Ion Stoica’s lecture at UCB.
Investigating Forms of Simulating Web Traffic Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum – Faculty.
Traffic Modeling.
8/28/2015  A. Orda, R. Rom, A. Segall, Design of Computer Networks Prof. Ariel Orda Room 914, ext 4646.
Whither Congestion Control? Sally Floyd E2ERG, July
1 Ns Tutorial: Case Studies John Heidemann (USC/ISI) Polly Huang (ETH Zurich) March 14, 2002.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
1 CSE 5346 – Networks II: High Performance Networks.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
High Performance Cluster Computing Architectures and Systems Hai Jin Internet and Cluster Computing Center.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
CS551: End-to-End Packet Dynamics Paxon’99 Christos Papadopoulos (
Telecommunications, the Internet, and Wireless Technology.
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
The Future of Transport Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
Networks and Distributed Systems Mark Stanovich Operating Systems COP 4610.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
TCP Behavior Inference Tool Jitendra Padhye, Sally Floyd Presented by Songjie Wei.
Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
MiddleMan: A Video Caching Proxy Server NOSSDAV 2000 Brian Smith Department of Computer Science Cornell University Ithaca, NY Soam Acharya Inktomi Corporation.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Networks and Distributed Systems Sarah Diesburg Operating Systems COP 4610.
Internet research Needs Better Models Sally Floyd, Eddie Kohler ISCI Center for Internet Research, Berkeley, California Presented by Max Podlesny.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
PathChirp & STAB Measuring Available Bandwidth and Locating Bottlenecks in Packet Networks Vinay Ribeiro Rolf Riedi, Richard Baraniuk Rice University spin.rice.edu.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
VINT: Status and Plans Deborah Estrin: Project overview Steve McCanne: ns architecture John Heidemann: scaling, visualization Audience: Comments and questions.
Network Processing Systems Design
CS 268: Computer Networking
A comparison of Ad-Hoc Routing Protocols
Taxonomy of network applications
CSCD 433/533 Advanced Computer Networks
Ns Tutorial: Case Studies
CPSC 641: WAN Measurement Carey Williamson
The Future of Transport
Internet Research Needs a Critical Perspective Towards Models
IT351: Mobile & Wireless Computing
Network Traffic Modeling
Vern Paxson and Sally Floyd, "Why We Don't Know How To Simulate The Internet", Proceedings of the 1997 Winter Simulation Conference, Dec1997 Sally Floyd.
Carey Williamson Department of Computer Science University of Calgary
Requirements Definition
Presentation transcript:

Difficulties in Simulating the Internet Sally Floyd, Senior Member, IEEE, and Vern Paxson IEEE/ACM Transactions on Networking, August 2001 Mingyu Sun Instructor: Dr. Herman D. Hughes CSE808 Fall 2001

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 2 Today’s topics Role of simulations in Internet research Difficulties in simulating the Internet Strategies to accommodate Develop a common network simulator

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 3 Role of simulation Measurement –Is needed for crucial ‘reality check’ –Challenge implicit assumptions Experiment –For dealing with implementation issues –For understanding behavior of intractable systems Analysis –Providing the possibility of exploring a model of the Internet Simulation –Complementary to analysis

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 4 Measurement and experiment What can do: –explore “real world” –the existing Internet –new environment What cannot do: –explore future Internet –explore different possible architectures –“Success Disaster” Example: HTTP protocol used by World Wide Web

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 5 Analysis and simulation Analysis: –Fundamental role –Complete control the model of Internet –Disadvantage: risk of losing Internet key behavior Simulation: –Complementary to Analysis –Check correctness –Overcome the difficult, impossible cases in analysis –Develop research intuition

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 6 Simulation: dangers and pitfalls Dynamic aspect of Internet Picking the underlying models Models used in Analysis and simulation Capable, accurate simulators Community requirement: immediate or long term Validating simulation: make scripts public

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 7 Properties of Internet Unify diverse networking technologies and administrative domains. –Uniform connectivity,not uniform behavior Big Size –99.8 million computers at the end of 2000 –Range of heterogeneity is large –Scaling problem: works fine with small number of computers, but not on large scale Changes: drastically

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 8 USENET Traffic Volume Bytes per day sent through the USENET bulletin board system, averaged over two-week intervals. The growth rate corresponds to exponential increase of 80% per year.

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 9 LBNL Traffic Volume Internet connections per day at LBNL. The growth rate corresponds to exponential increase of 52% per year. LBNL- Lawrence Berkeley National Laboratory

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 10 Growth of LBNL’s WWW Traffic World Wide Web (HTTP) connections per month at LBNL.The growth rate corresponds to doubling every 7- 8 weeks.

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 11 Heterogeneity -- Topology and link Hard to characterize the protocol over a range of topologies –Constantly change, secret topological information –Topology generator based on current Internet –Large-scale nature of network topology and protocols Modems Vs. fiber optic links Wire (Traverse copper, glass wire) Vs.Wireless (radio, infrared-based) Point-to-point Vs. broadcast links (multi-access) Land-based Vs. satellite links( geosynchronous orbit, low- earth orbit) Dynamic routing (latency, bandwidth, load of paths) Routing asymmetric (large topology, scaling)

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 12 Heterogeneity -- Protocol Conceptually, the Internet uses a unified set of protocols In reality, each protocol has been implemented differently. –Some studies are sensitive to the details of the protocol –different user, different features, even bugs –Example: TCP 400 implementation and versions.TCP Tahoe and Reno replaced by NewReno and SACK One must decide which applications to simulate using those protocols –Different applications have major different characteristics –These characteristics can vary considerably from site to site

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 13 Heterogeneity -- Traffic Basic question: –How to introduce different traffic sources into the simulation, while retaining the end-to-end congestion control Trace-driven –Problem: Rate adaptation from end-to-end congestion control causes shaping –Example: a connection observed on a high-speed unloaded link might still send packages at a rate much lower than what the link could sustain because somewhere else along the path insufficient resources are available. –Solution: Trace-driven source-level simulation preferable to trace- driven packet-level because data volume and the application-level pattern are NOT shaped by the network’s current property

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 14 Problems with source-level trace-driven NOT all sources can be reliably characterized by traffic traces –Example: remote login users terminate or justify commands –Applications that are inherently adaptive (Internet Video) will be shaped at both packet-level and application level. Complexity of traffic congestion level to the network link –From all degrees of congestion to none at all –Predicting future evolution of congestion harder than characterizing certain level of congestion at a particular time Scaling issue arises using source models of individual connections to generate aggregated cross-traffic for simulation –Expensive to simulate a traffic aggregate on a per source basis

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 15 Rapid and unpredictable change Possibilities for unpredictable areas of change: –Pricing structures –Scheduling –Wireless –Impoverished devices –Native multicast –Differentiated service –Ubiquitous web-caching –a new “killer app” Implications: –Our research should not be heavily biased by network details that are likely to change. –Our research should not be invalidated by major architectural changes that might or might not come to dominate the Internet architecture several years down the road.

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 16 Coping strategies (I) Search for invariants What is invariant? –Some facet of behavior that has been empirically shown to hold in a very wide range of environments (traffic characteristics, call arrival processes, session durations…) Promising candidates: –Diurnal patterns of activity Different patterns for different protocols, NNTP Different patterns for the same protocols, work/leisure surf Geographic effects on across time zone communication –Self- similarity –Poisson session arrivals –Log-normal connection sizes –Heavy-tailed distributions –Invariant distribution for Telnet packet –Invariant characteristics of the global topology

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 17 Coping strategies (II) Exploring the parameter space Explore network behavior as a function of changing parameters –Parameters include protocol specifics, router queue management, packet scheduling, network topologies and link properties, or traffic mixes. –Rule of thumb: Order of magnitude in parameter Pitfall: Internet includes nonlinear feedback mechanisms that may cause mistakes made by simulation artifacts not present in the real world. –Correct interpretation of simulation result

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 18 NS simulator What is NS? –NS is a multiprotocol simulator that implements unicast and multicast routing algorithms, transport and session protocols (including both reliable and unreliable multicast protocols), reservations and integrated services. –NS incorporates a range of link-layer topologies and scheduling and queue management algorithms. –NS also incorporates libraries of network topology generators and traffic generators, the network animator NAM, an emulation interface to allow the NS simulator to interact with real-world traffic. Advantage: –Ability to build upon the work of others in sharing a common simulator Disadvantages: –affected by the same bugs or the same modeling assumptions that subtly skew the results. –No simulator eliminates the difficulties inherent in Internet simulation Trends in network simulation: Parallel and distributed simulators

Nov. 12, 2001Mingyu Sun, CSE808 Presentation 19 Final notes Discussed issues & difficulties in modeling Internet traffic, topology and protocols Acknowledged limitations & potential of simulations and model-based research Interpreting simulation results and drawing conclusions Besides intuition and good judgment, rely on other tools (measurements, experiments and analysis) Thank you!