1 Model-based Identification of Dominant Congested Links Wei Wei, Bing Wang, Don Towsley, Jim Kurose {weiwei, bing, towsley,

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Chapter 5: CPU Scheduling
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Reconsidering Reliable Transport Protocol in Heterogeneous Wireless Networks Wang Yang Tsinghua University 1.
Multicast congestion control on many-to- many videoconferencing Xuan Zhang Network Research Center Tsinghua University, China.
Challenges in Making Tomography Practical
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
1 RXQ Customer Drop Submitted by Supplier Process Flow Diagram Customer Supplier Distribution Company Supplier sends Drop Request to Distribution.
REQ Drop from Demand Response Programs Process Flow Retail Customer Demand Response Service Provider (DRSP) Distribution Company 1 Drop Request.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Advanced Technology Laboratories page 1 Network Performance Monitoring at Small Time Scales Dina Papagiannaki, Rene Cruz, Christophe Diot.
Ramin Khalili (T-Labs/TUB) Nicolas Gast (LCA2-EPFL)
Edge-based Network Modeling and Inference
International Telecommunication Union Workshop on End-to-End Quality of Service.What is it? How do we get it? Geneva, 1-3 October 2003 Are Existing Performance.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING Think Distributive property backwards Work down, Show all steps ax + ay = a(x + y)
Addition Facts
Michele Pagano – A Survey on TCP Performance Evaluation and Modeling 1 Department of Information Engineering University of Pisa Network Telecomunication.
ZMQS ZMQS
When TCP Friendliness Becomes Harmful Amit Mondal Aleksandar Kuzmanovic Northwestern University
Discrete time Markov Chain
Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash Tehrani, Alex Dimakis, Athina Markopoulou UC Irvine, USC, UT Austin Presented.
Two-Market Inter-domain Bandwidth Contracting
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Disambiguation of Residential Wired and Wireless Access in a Forensic Setting Sookhyun.
Optimal Capacity Sharing of Networks with Multiple Overlays Zheng Ma, Jiang Chen, Yang Richard Yang and Arvind Krishnamurthy Yale University University.
TCP Probe: A TCP with Built-in Path Capacity Estimation Anders Persson, Cesar Marcondes, Ling-Jyh Chen, Li Lao, M. Y. Sanadidi, Mario Gerla Computer Science.
1 Comnet 2010 Communication Networks Recitation 4 Scheduling & Drop Policies.
O X Click on Number next to person for a question.
© S Haughton more than 3?
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Twenty Questions Subject: Twenty Questions
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Models of Links Carrying Multi-Service Traffic Chapter 7 Modeling and Dimensioning.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Abhigyan, Aditya Mishra, Vikas Kumar, Arun Venkataramani University of Massachusetts Amherst 1.
Week 1.
We will resume in: 25 Minutes.
Dantzig-Wolfe Decomposition
1 Unit 1 Kinematics Chapter 1 Day
O X Click on Number next to person for a question.
A Measurement Study of Available Bandwidth Estimation Tools MIT - CSAIL with Jacob Strauss & Frans Kaashoek Dina Katabi.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
Maximum Likelihood Network Topology Identification Mark Coates McGill University Robert Nowak Rui Castro Rice University DYNAMICS May 5 th,2003.
Computer Science 1 Characterizing Link Properties Using “Loss-pairs” Jun Liu (joint work with Prof. Mark Crovella)
Particle Filtering in Network Tomography
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
Presentation transcript:

1 Model-based Identification of Dominant Congested Links Wei Wei, Bing Wang, Don Towsley, Jim Kurose {weiwei, bing, towsley,

2 Outline Motivation Virtual probe, virtual queuing delay Dominant congested links Identifying dominant congested links Validation Conclusions, future work

3 Motivation Dominant congested link (informally): link with most losses and significant delays on end-end path Applications otraffic engineering ounderstand dynamics of network Direct measurement of an individual link difficult ocommercial reasons oexistence of multiple ISPs along path

4 Virtual Probe, Virtual Queuing Delay Virtual Probe: infinitesimally small packet: odoes not disturb real traffic, never dropped oqueuing delay due to queue occupancy oIf queue full, mark as lost, experience maximum queuing delay, go to next link Virtual Queuing Delay: W oEnd-end queuing delay of virtual probes with loss marks Two important questions about W oMost loss marks at one link? oMajor part of W due to experiencing maximum queuing delay?

5 Virtual Probe, Virtual Queuing Delay –cont

6 Strongly Dominant Congested Link (SDCL) Link k is a strongly dominant congested link in [t 1,t 2 ) iff for any virtual probe sent at any time t in [t 1,t 2 ) satisfies, oall losses occur only at link k oIf experience max queuing delay on link k, this max queuing delay is at least sum of queuing delays it experiences on other links

7 Weakly Dominant Congested Link (WDCL) Link k is a weakly dominant congested link with parameter θ and in [t 1, t 2 ], iff a virtual probe sent at t satisfies where 0 θ <0.5, 0 1,

8 SDCL Illustration QkQk + QkQk QkQk QkQk QkQk W Q k : maximum queuing delay W: virtual queuing delay

9 Property of SDCL Hypothesis H 0 : A SDCL exists. Find D= min{w|F W (w) > 0},Check F W (2D). If F W (2D) < 1, reject. Otherwise, accept. Example:

10 Property of WDCL Hypothesis H 0 : A WDCL exists. Find D= min{w|F W (w) > θ},Check F W (2D). If F W (2D) < (1- θ)(1-φ), reject. Otherwise, accept. Example:

11 An Example – Test of SDCL H 0 rejected ++ = > + + = D=

12 Inferring Virtual Queuing Delay Distribution F W (w) Use virtual queuing delay distribution to test if DCL exist Infer F W (w) oLinear Interpolation oHidden Markov model oMarkov model with a hidden dimension

13 Markov Model with a Hidden Dimension Model components oState: (X t, Y t ), Y t : delay, X t : hidden state oN: # of hidden states oM: # of delay bins oπ(i,j): initial distribution oP (i,j)(k,l) : transition matrix os(j): P(loss|delay =j) When N=1, a Markov model

14 Packet Probes and Model Inference One-way End-end Periodic probes oDelay Y t, t=1, 2, …, T. oY t = * if probe t is lost Parameter inference algorithm oForward-backward inference oIterative approach After algorithm converges os(j)=P(loss|delay=j), j=1,2, …, M.

15 Obtain Virtual Queuing Delay Distribution F W (w) from s(w) Obtain virtual queuing delay distribution from model and trace

16 Evaluation Ns simulation oControlled environment oGlobal knowledge oValidation of methodology Internet experiment oApplying methodology in real world oProbe duration needed to obtain correct identification

17 Simulation Setup p1p1 p2p2 p3p3

18 Validation via Simulation (p1,p2,p3)= (0,.002,.038) D=4 F W (8) =1 > (1-.07)(1-.1) YES WDCL(.07,.1)?

19 Internet Experiments Residence House – USC Loss prob. = 0.04 WDCL(.1,.1)? D=1, F W (2D)<(1-.1)(1-.1) No

20 Conclusions and Future Work Existence of DCL Introduce virtual queuing delay Model-based approach from one-way end-end measurement Only minutes of probes needed Future work oControlled test-bed experiments and more/richer Internet experiments oScenarios where wireless network is present

21 Thank you!