Www3.informatik.uni-wuerzburg.de Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Performance Metrics for Resilient.

Slides:



Advertisements
Similar presentations
Micro-loop Prevention Methods draft-bryant-shand-lf-conv-frmwk-00.txt draft-zinin-microloop-analysis-00.txt.
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Integrated Analysis of Transportation Network with Pipeline System Vulnerabilities Berrin Tansel 1, Xia Jin 1, Kollol Shams 1, Bahareh Inanloo 1, Albert.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
Distributed Algorithms for Secure Multipath Routing
TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He,
Traffic Engineering With Traditional IP Routing Protocols
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Performance Analysis of Wavelength-Routed Optical Networks with Connection Request Retrials Fei Xue+, S. J. Ben Yoo+, Hiroyuki Yokoyama*, and Yukio Horiuchi*
Efficient replica maintenance for distributed storage systems Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon, M. Frans Kaashoek,
Models for Measuring and Hedging Risks in a Network Plan
Jerry Chou and Bill Lin University of California, San Diego
Supply Chain Logistics Management
Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol Jiayue He Princeton University Joint work with Martin Suchara,
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Tesseract A 4D Network Control Plane
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
UC Berkeley Improving MapReduce Performance in Heterogeneous Environments Matei Zaharia, Andy Konwinski, Anthony Joseph, Randy Katz, Ion Stoica University.
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
1 EL736 Communications Networks II: Design and Algorithms Class11: Multi-Hour and Multi-Layer Network Design 12/05/2007.
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
End-to-end QoE Optimization Through Overlay Network Deployment Bart De Vleeschauwer, Filip De Turck, Bart Dhoedt and Piet Demeester Ghent University -
On the Interaction between Dynamic Routing in the Native and Overlay Layers INFOCOM 2006 Srinivasan Seetharaman Mostafa Ammar College of Computing Georgia.
Department of Computer Science at Florida State LFTI: A Performance Metric for Assessing Interconnect topology and routing design Background ‒ Innovations.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Huirong Fu and Edward W. Knightly Rice Networks Group Aggregation and Scalable QoS: A Performance Study.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
The Performance Evaluation of Intra-domain Bandwidth Allocation and Inter-domain Routing Algorithms for a QoS-guaranteed Routing Path Discovery Bo Li,
An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks Min Qin and Roger Zimmermann Computer Science Department, Integrated Media Systems.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Run-time Adaptive on-chip Communication Scheme 林孟諭 Dept. of Electrical Engineering National Cheng Kung University Tainan, Taiwan, R.O.C.
Intelligent Database Systems Lab Presenter : BEI-YI JIANG Authors : HAI V. PHAM, ERIC W. COOPER, THANG CAO, KATSUARI KAMEI INFORMATION SCIENCES Hybrid.
Aggregate sum retrieval in sensor network by distributed prefix sum data cube Lok Hang Lee and Man Hon Wong The Chinese University of Hong Kong Department.
1 A Multi-Rate Routing Protocol with Connection Entropy for MANETs Cao Trong Hieu, Young Cheol Bang, Jin Ho Kim, Young An Kim, and Choong Seon Hong Presenter:
Mike Freedman Fall 2012 COS 561: Advanced Computer Networks Traffic Engineering.
Network Computing Laboratory Load Balancing and Stability Issues in Algorithms for Service Composition Bhaskaran Raman & Randy H.Katz U.C Berkeley INFOCOM.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Draft-deoliveira-diff-te-preemption-02.txt J. C. de Oliveira, JP Vasseur, L. Chen, C. Scoglio Updates: –Co-author: JP Vasseur –New preemption criterion.
Performance Analysis of Inter-Domain Path Computation Methodologies draft-dasgupta-ccamp-path-comp-analysis-00.txt Sukrit Dasgupta, Jaudelice C. de Oliveira.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Www3.informatik.uni-wuerzburg.de Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia Modeling User Activity and Network.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Probabilistic Skylines on Uncertain Data (VLDB2007) Jian Pei et al Supervisor: Dr Benjamin Kao Presenter: For Date: 22 Feb 2008 ??: the possible world.
1 On the Interaction between Dynamic Routing in the Native and Overlay Layers Infocom2006 Srinivasan Seetharaman and Mostafa Ammar College of Computing.
Architecture and Algorithms for an IEEE 802
A Study of Group-Tree Matching in Large Scale Group Communications
Introduction Secondary Users (SUs) Primary Users (PUs)
Multi-Core Parallel Routing
Student: Fang Hui Supervisor: Teo Yong Meng
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Network Planning & Capacity Management
Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng
Presentation transcript:

www3.informatik.uni-wuerzburg.de Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Performance Metrics for Resilient Networks Michael Menth, Jens Milbrandt, Rüdiger Martin, Frank Lehrieder, Florian Höhn This work was in cooperation with Infosim GmbH & CoKG and supported by the Bavarian Ministry of Economic Affairs

2 Click to edit author name Outline  Motivation  Unavailability of the network for end-to-end (e2e) aggregates  Calculation  Illustration of results  Overload probability for links  Calculation  Illustration of results  Summary & outlook

3 Click to edit author name Motivation  Availability of the network  Link failures  Node failures  Link overload  Redirected traffic due to failures  More traffic due to increased user activity (hot spots)  More traffic due to interdomain rerouting  Tool for the assessment of network resilience  Network availability  Overload probability  Why is it useful?  Early discovery of risks  Support of intentional overprovisioning  Evaluation of potential upgrade strategies –New routing –More bandwidth, new links or nodes –New customers or SLAs

4 Click to edit author name Key Ideas  Network elements can fail  Failure probability  Independent failures  Correlated failures modelled by virtual element  Traffic matrices can vary  Example: additional interdomain traffic, hot spots  Traffic matrix probability  Independent of network failures  Definition: scenario = set of network failures and traffic matrix  Scenarios determine unavailability / overload  Derive scenario probability  Take all scenarios for the analysis with probability larger than p min  Definition: set of considered scenarios S

5 Click to edit author name Calculation of Network (Un)Availability  Problem: multiple failures can compromise connectivity  Loss of connectivity for e2e aggregate between node v and w in special scenario s?  Disconnected(v,w,s)  {0, 1}  Analysis of routing in scenario s  Conditional probability for loss of connectivity  Estimate for unavailability: not all possible scenarios respected in S  Upper and lower bounds available

6 Click to edit author name European Nobel Test Network

7 Click to edit author name Network Unavailability for Madrid‘s Aggregates of Madrid‘s Aggregates

8 Click to edit author name Average Network Unavailability for Routers

9 Click to edit author name Network Unavailability for Overall Traffic C

10 Click to edit author name Calculation of „Link Overload“  Problem: redirected and extra traffic leads to overload  Link utilization ρ(l,s) of link l in special scenario s?  Analysis of routing and traffic matrix in special scenario s  Probability to have utilization U(l) larger than x on link l  Complementary cumulative distribution function (CCDF)  Calculate ρ(l,s) for all considered scenarios s  S  Sum all probabilities p(s) of scenario with ρ(l,s)>x  Comments  Intelligent data structures and efficient algorithms required  Only estimate, but upper and lower bounds available

11 Click to edit author name Impact of Probability Limit p max for Failure Scenarios p min =10 -6 p min =10 -8

12 Click to edit author name Which Link is Most at Risk?

13 Click to edit author name Link Rankings  Utilization threshold u c  Utilization percentile q  Appropriate weighted integral based on utilization distribution

14 Click to edit author name Graphical Presentation

15 Click to edit author name Summary & Conclusion  Tool for assessment of network resilience  Network availability  „Overload“ probability  Useful for planning and operation of networks  Achievements  Fast algorithms (Java)  Visualization of –Unavailabilty –„Overload“  Outlook: interdomain resilience