IDMaps: A Global Internet Host Distance Estimation Service P. Francis, S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, L. Zhang Presenter: Zhenying Liu.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
1 Analyzing Kleinberg’s Small-world Model Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Scalable Content-Addressable Network Lintao Liu
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
The Cache Location Problem. Overview TERCs Vs. Proxies Stability Cache location.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
1 Complexity of Network Synchronization Raeda Naamnieh.
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy,
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
A Comparison of Layering and Stream Replication Video Multicast Schemes Taehyun Kim and Mostafa H. Ammar.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
ASWP – Ad-hoc Routing with Interference Consideration June 28, 2005.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
Online Algorithms for Network Design Adam Meyerson UCLA.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Predicting Communication Latency in the Internet Dragan Milic Universität Bern.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
On the Power of Off-line Data in Approximating Internet Distances Danny Raz Technion - Israel Institute.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
The Influence of Network Topology on the Efficiency of QoS Multicast Heuristic Algorithms Maciej Piechowiak Piotr Zwierzykowski Poznan University of Technology,
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
COSC 5341 High-Performance Computer Networks Presentation for By Linghai Zhang ID:
Static Process Scheduling
1 Algorithmic aspects of radio access network design in 4G cellular networks David Amzallag Computer Science Department, Technion Joint work with Seffi.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Part 2 of the paper Pavlin Radoslavov, Christos Papadopoulos,
Distance Vector Routing
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Lecture 13 – Network Mapping
Presented by Tae-Seok Kim
Server Allocation for Multiplayer Cloud Gaming
Presentation transcript:

IDMaps: A Global Internet Host Distance Estimation Service P. Francis, S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, L. Zhang Presenter: Zhenying Liu

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

Background Increasing need to learn network distances, bandwidth One method Measure the distance by itself(ping, traceroute) A useful general service: quick, efficient SONAR, Feb HOPS(Host proximity Service) Need underlying measurement infrastructure to provide distance measurements

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

IDMaps Internet Distance Map Service To be underlying service that provides the distance information used by SONAR/HOPS Goals Not near instantaneous information Determine roughly the best service given technology constraints Consider whether there are applications for which this level of service would be useful

Resulting Goals Separation of functions Separation of IDMaps and the query/reply service Distance Metrics Latency(round-trip delay) useful, easy to provide Bandwidth Useful, difficult to provide, expensive to measure Accuracy of the distance information High accuracy: difficult to achieve To obtain accuracy within a factor of 2

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

Alternative Architectures and Related Work SPAND, Remos: provide only distance information between hosts close to a distance server and remote hosts on the internet For each server: scales proportionally to the number of destination For all sites in the Internet: N 2 Stemm: passive monitoring Not perturb actual internet traffic Only measure regions previous traversed Not adapt to the internet topology changes More human efforts

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

IDMaps Architecture Address three questions What form does the distance information take? What are IDMaps’ components? How should the distance information be disseminated?

Various forms of distance information FormsScalecomments Global IP addr.H 2 H: # of hosts Infeasible Addr. Prefix(AP)P 2 P: # of APs; 200,000 Easily terabytes ASA 2 +P’ ( A<<P ) A: # of AS, P’:# of BGP-advertised IP addr. Blocks A = 100,000 (large) Its accuracy is highly suspected Cluster of APsB 2 +P B: # of Traces If B = 500, manageable Reasonable accuracy

The form used There are three main components APs, Tracers, and the virtual links(the raw distance) AP: a consecutive address range of IP addresses Tracers: Some systems that are distributed around the Internet Assumption We can estimate the distance between two points as the sum of distances between intermediate points

AP1 AP2 Tracer1 b a c |a-c|<|b|<|a+c| ? Feasible to estimate distance? -- APs -- Tracers An assumption: Triangulation

To support the triangulation Set up 2 experiments: D1(1995), D2(1997) Fig. Shows the ratios of for all shortest-path triangulation in the data sets Between 75% an 90% of triangulation estimates fall within a factor of 2 of the real distance The resulting estimates are acceptable!

Tracer placement Two problems How many tracers are optimal? Given the number of tracers, how to put to minimize the maximum distance between an AP and the nearest tracer? Two graph theoretic approaches that can apply K-HST algorithm Minimum K-center algorithm These algorithms are used to determine the placement of fire stations, ambulance placement, etc. with a priori

k-HST: decide # of tracers 1 st phase: The graph is recursively partitioned: A node is arbitrarily selected from the current(parent) partition, and all the nodes that are within a random radius from this node form a new node partition The radius of the child partition is a factor of k smaller than the diameter of the parent partition Recurs until each node is in a partition of its own

k-HST tree 2 nd phase: virtual node is assigned to each of the partition on each level The diameter of a partition The furthest distance between two nodes in the partition Equals to 2 times of the length of the links from a virtual node to its children

Use K-HST tree Devise a greedy algorithm to find the number of tracers when the maximum distance is bounded to D Push the tracers down the tree until it discovers a partition with diameter <=D The number of partitions is the minimum number of tracers Set the virtual nodes of these partitions to be the tracer

Minimum K-Center Algorithm K-Center problem The placement of a given number of centers such that the maximum distance from a node to the nearest center is minimized NP-complete Willing to tolerate inaccuracies within a factor of 2(2-approximation) No worse than twice the maximum Observation: Guarantee that the distance from a node to the nearest center is bounded

Minimum K-Center Algorithm: details G=(V,E), E=V×V, c(e) is the cost of the shortest path between (v 1, v 2 ) All the graph edges are arranged in non-decreasing order by cost G i 2 is the graph whenever there is a path between u and v in G i of at most two hops, u  v An independent set of a graph G(V,E) is such that, for all u,v  V’, the edge (u,v) is not in E An independent set of G i 2 is thus a set of nodes in G i that are at least 3 hops apart in G i The maximal independent set M as an independent set V’ such that all nodes in V-V’ are at most one hop away from nodes in V’

1. Construct G i 2,G 2 2,…, G m 2 2. Compute Mi for each G i 2 3. Find the smallest I such that |M i |<=K, say j 4. M j is the set of K centers Algorithm 2 (2-approximate minimum-center [18]): details

Tracer Heuristics Stub-AS only connected to one other AS Transit-AS connected to one or more other AS allows itself to be used as a conduit for traffic (transit traffic) between other AS's Most large ISPs are Transit-AS’s Mixed Randomly, with uniform distribution placed on the network

Virtual links Tracer-tracer virtual links Not necessary to list all B 2 tracer-tracer distances Given a number of tracers in Seattle and Boston It would almost certainly not to be useful to know all of the distance between them Allow a sufficient distance approximation between hosts in Seattle and hosts in Boston

Virtual links Tracer-AP VLs A dedicated tracer? More than one tracer? C in AP1 will be directed to mirror M1 in AP3 instead of M2 in AP2 Had tracer T2 also traced to AP1, the client would have been directed to M2

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

Performance Evaluation Topology Generation Waxman, Tiers, Inet Simulating IDMaps Infrastructure Tracer placement: Stub-AS, Transit-AS Distance map computation Tracer-tracer VLs and Tracer-AP VLs

Performance Metric Computation Nearest mirror selection P app : the percentage of correct IDMaps’ answers over total number of clients Consider IDMaps’ server selection correct As long as the distance between a client and the nearest mirror determined by IDMaps is within a factor of λ times the distance between the client and the actual nearest mirror ( we use λ=2)

Simulation result Mirror selection using IDMaps gives noticeable improvement over random selection Network topology can affect IDMaps’ performance Tracer placement heuristics that do not rely on network topology can perform as well or better than algorithms that requires a priori knowledge of the topology

Simulation result Adding more tracers gives diminishing return Number of tracer-tracer VLs required for good performance can be on the order of B with a small constant Increasing the number of tracers tracing to each AP improves IDMaps’ performance with diminishing return

Mirror selection Transit-AS The probability of that at least 80% of all clients will be directed to the “correct” mirror is 100% Up to 98% of all clients will be directed to the correct mirror is only 85%

Mirror selection Mirror selection using distance maps outperforms random selection regardless of the tracer placement algorithm Qualitatively, the results from agree with the conclusion: mirror selection using distance maps outperforms random selection

Effect of Topology

Performance on Tiers generated topology exhibit a qualitatively different behavior than those on other topologies The transit-AS heuristic gives better IDMaps performance than the k-HST algorithm on topologies generated from Inet and Waxman, but not so in the topologies generated from Tiers

Contents Background Goals Related work Architecture Performance Evaluation Conclusion

A global distance measurement infrastructure called IDMaps is purposed It can be placed on the Internet to collect distance information Nearest mirror selection fro clients Significant improvement over random selection Do not require a full knowledge of the underling topology

Conclusion IDMaps overhead can be minimized by grouping Internet addresses into APs to reduce the number of measurements Apply t-spanner to tracer-tracer VLs can result in linear measurement overhead with respect to the number of tracers in the common case Overall, this study has provided positive results to demonstrate that a useful Internet distance map service can indeed be built scalably

(Stub AS)