Merging Logical Topologies Using End-to-end Measurements Michael Rabbat Mark Coates Robert Nowak Internet Measurement Conference 2003 Tuesday October 28,

Slides:



Advertisements
Similar presentations
Challenges in Making Tomography Practical
Advertisements

Locating Congested Segments over the Internet Based on Multiple End-to-End Path Measurements Shigehiro Ano * Atsuo Tachibana * Toru Hasegawa * Masato Tsuru.
Collaborators: Mark Coates, Rui Castro, Ryan King, Mike Rabbat, Yolanda Tsang, Vinay Ribeiro, Shri Sarvotham, Rolf Reidi Network Bandwidth Estimation and.
Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference.
pathChirp Efficient Available Bandwidth Estimation
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Next Generation Network Architectures Summary John.
Introduction 1 Lecture 22 Network Layer (Broadcast and Multicast) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
Multicasting 1. Multicast Applications News/sports/stock/weather updates Distance learning Configuration, routing updates, service location Pointcast-type.
Multicast on the Internet CSE April 2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
The Network Layer Functions: Congestion Control
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Lo Presti 1 Network Tomography Francesco Lo Presti Dipartimento di Informatica - Università dell’Aquila.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Maximum Likelihood Network Topology Identification Mark Coates McGill University Robert Nowak Rui Castro Rice University DYNAMICS May 5 th,2003.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Network Tomography from Multiple Senders Rob Nowak Thursday, January 15, 2004 In collaboration with Mark Coates and Michael Rabbat.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
1 End-to-End Detection of Shared Bottlenecks Sridhar Machiraju and Weidong Cui Sahara Winter Retreat 2003.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
Network Tomography through End- End Multicast Measurements D. Towsley U. Massachusetts collaborators: R. Caceres, N. Duffield, F. Lo Presti (AT&T) T. Bu,
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
FTDCS 2003 Network Tomography based Unresponsive Flow Detection and Control Authors Ahsan Habib, Bharat Bhragava Presenter Mohamed.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
1 Network Topology Measurement Yang Chen CS 8803.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
2005/10/211 A Survey on Physical Network Topology Estimation October 21, 2005 Chikayama-Taura Lab. Tatsuya Shirai.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Multiple Source, Multiple Destination Network Tomography Michael Rabbat IEEE Infocom, Hong Kong Wednesday, March 10, 2004 Co-Authors: Mark Coates and Robert.
Chapter 18 IP: Internet Protocol Addresses
1 Chapter 11 Extending Networks (Repeaters, Bridges, Switches)
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Optimal Sampling Strategies for Multiscale Stochastic Processes Vinay Ribeiro Rolf Riedi, Rich Baraniuk (Rice University)
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 21: Multicast Routing Slides used with.
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Distributed Network Coding Based Opportunistic Routing for Multicast Abdallah Khreishah, Issa Khalil, and Jie Wu.
Precision Measurements with the EVERGROW Traffic Observatory Péter Hága István Csabai.
2/25/20161 Multicast on the Internet CSE 6590 Fall 2009.
Lo Presti 1 Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING Network.
Real-time Transport for Assured Forwarding: An Architecture for both Unicast and Multicast Applications By Ashraf Matrawy and Ioannis Lambadaris From Carleton.
22.1 Network Layer Delivery, Forwarding, and Routing.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
Zueyong Zhu† and J. William Atwood‡
Connecting Network Components
Multicast Outline Multicast Introduction and Motivation DVRMP.
Improved Algorithms for Network Topology Discovery
Hierarchical Clustering and Network Topology Identification
Connecting Devices LANs or WANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs or WANs, we.
What’s “Inside” a Router?
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
pathChirp Efficient Available Bandwidth Estimation
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
Optional Read Slides: Network Multicast
pathChirp Efficient Available Bandwidth Estimation
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Merging Logical Topologies Using End-to-end Measurements Michael Rabbat Mark Coates Robert Nowak Internet Measurement Conference 2003 Tuesday October 28, 2003

Motivation: BGP data gives the big picture ICMP-based techniques (i.e. traceroute ) dont work everywhere Existing end-to-end techniques: Single active source, many receivers Assume tree structured logical topology Exploit: –Correlated events on upstream links –Additive, non-decreasing nature of performance parameters [Ratnasamy & McCanne], [Duffield et al.], [Bestavros et al.], [Coates et al.] A Topology Identification via Active Probing

Extending to Multiple Sources Marginal Utility [Barford et al., 01] –Can gain by using a few more sources Net. Tomo. on General Topologies [Bu et al., 02] –Evaluate various algorithms for inferring internal characteristics –Sources make measurements separately –Identifiability conditions given the general topology A B No labels on internal nodes Merging is non-trivial

Merging Strategy A B A B Identify joining nodes merge topologies –Placement is logical, relative Non-shared joining node –Merging node for routes to a single receiver Shared joining node –Routes to multiple receivers merge at one node

Goal: Identify Shared Joining Nodes Two sources, two receivers Is there a shared joining node? Locate joining node relative to branching node All other cases have more than one non-shared joining node Make measurements and form a binary hypothesis test: H 0 : One joining node H 1 : More than one joining node A B 1 2 A B 1 2 A 21 B 21

Packet Arrival Order Measurements Assumptions: 1.Sources synchronized (for now) 2.Arrival order determined at first shared queue A B 1 2 t(n)t(n) t(n) + t t v(n)v(n) t Procedure: 1.At t(n), send packets to Rcv1 2.After t, send packets to Rcv2 t > O(1/b min ) 3.Compare arrival orders 4.Repeat, varying send time at B v(n) ~ Unif orm(-D, D) |D| ¼ O(RTT max ) À t Rcv1Rcv2y(n)y(n) AA0 BB0 AB1 BA1

Analysis: Packet Arrival Order and Timing A B 1

Conditions for a Different Arrival Order Prob. different arrival order | v(n) A B 1 2 Contours of p(d 1, d 2 ) d1d1 d2d2

For Non-Shared Topologies On packet reordering [Bellardo & Savage, 02] –Pr{In-network reordering} / 1/(time-spacing) Sources of measurement noise –Packet reordering for a few values of v(n) –Spacing t distorted by queueing (also, for few values of v) Prob. different arrival order | v(n) A B 1 2 Contours of p(d 1, d 2 ) d1d1 d2d2

Measure the Noise Send all packets to one receiver Force one joining node A B 1 2 t(n)t(n) t v(n)v(n) t Similar procedure: 1.At t(n), send packets to Rcv1 2.After t, send to Rcv1 again t ¼ O(1/b min ) 3.Compare arrival orders 4.Repeat, varying send time at B v(n) ~ Unif orm(-D, D) |D| ¼ O(RTT max ) Rcv1Rcv2y1(n)y1(n) AA0 BB0 AB1 BA1 Must be noise

Making A Decision A B 1 2 A B 1 2

Some Experiments Rice ECE LAN –18 Unix/Linux hosts –Spread across two buildings, two VLANs –Mostly layer-2, two routers –Validated with help from IT Internet Test bed –11 academic hosts –Mostly N. American, few in Europe –Validated using traceroute Extremely successful

Summary Merge logical topologies by identifying joining nodes –Shared joining nodes located relative to branching node Novel multiple source active probing scheme –Uniform random offset –Look for packet arrival order differences A few concluding remarks –Unicast or multicast –O(NS 2 R 2 ) measurements, reduce to O(NS 2 R) using stripes –Infrastructure independent (layer-3 or layer-2) Signal Processing In Networking