CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon (Technion, Israel) Joint work with Iddo Hanniel and Isaac Keslassy ( Technion ) 1.

Slides:



Advertisements
Similar presentations
A Switch-Based Approach to Starvation in Data Centers Alex Shpiner and Isaac Keslassy Department of Electrical Engineering, Technion. Gabi Bracha, Eyal.
Advertisements

Traffic Engineering with Forward Fault Correction (FFC)
Data Streaming Algorithms for Accurate and Efficient Measurement of Traffic and Flow Matrices Qi Zhao*, Abhishek Kumar*, Jia Wang + and Jun (Jim) Xu* *College.
OpenSketch Slides courtesy of Minlan Yu 1. Management = Measurement + Control Traffic engineering – Identify large traffic aggregates, traffic changes.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
A Fast and Compact Method for Unveiling Significant Patterns in High-Speed Networks Tian Bu 1, Jin Cao 1, Aiyou Chen 1, Patrick P. C. Lee 2 Bell Labs,
The 9th Israel Networking Day 2014 Scaling Multi-Core Network Processors Without the Reordering Bottleneck Alex Shpiner (Technion/Mellanox) Isaac Keslassy.
Fast, Memory-Efficient Traffic Estimation by Coincidence Counting Fang Hao 1, Murali Kodialam 1, T. V. Lakshman 1, Hui Zhang 2, 1 Bell Labs, Lucent Technologies.
* Mellanox Technologies LTD, + Technion - EE Department
Modeling the Interactions of Congestion Control and Switch Scheduling Alex Shpiner Joint work with Isaac Keslassy Faculty of Electrical Engineering Faculty.
Advanced Computer Networking Congestion Control for High Bandwidth-Delay Product Environments (XCP Algorithm) 1.
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
On the Code Length of TCAM Coding Schemes Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) 1.
1 Reversible Sketches for Efficient and Accurate Change Detection over Network Data Streams Robert Schweller Ashish Gupta Elliot Parsons Yan Chen Computer.
Hash Tables With Finite Buckets Are Less Resistant to Deletions Yossi Kanizo (Technion, Israel) Joint work with David Hay (Columbia U. and Hebrew U.) and.
Polytechnic University,ECE Department1 Detection of “Hot Spots” Paper Title : Joint Data Streaming and Sampling Techniques for Detection of Super Sources.
Analysis of a Statistics Counter Architecture Devavrat Shah, Sundar Iyer, Balaji Prabhakar & Nick McKeown (devavrat, sundaes, balaji,
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller 1, Zhichun Li 1, Yan Chen 1, Yan Gao 1, Ashish.
1 Architectural Results in the Optical Router Project Da Chuang, Isaac Keslassy, Nick McKeown High Performance Networking Group
Modeling TCP in Small-Buffer Networks
A Switch-Based Approach to Starvation in Data Centers Alex Shpiner Joint work with Isaac Keslassy Faculty of Electrical Engineering Faculty of Electrical.
Towards a High-speed Router-based Anomaly/Intrusion Detection System (HRAID) Zhichun Li, Yan Gao, Yan Chen Northwestern.
1 Counter Braids A novel counter architecture for network measurement.
Architecture and Routing for NoC-based FPGA Israel Cidon* *joint work with Roman Gindin and Idit Keidar.
Statistical Approach to NoC Design Itamar Cohen, Ori Rottenstreich and Isaac Keslassy Technion (Israel)
Dream Slides Courtesy of Minlan Yu (USC) 1. Challenges in Flow-based Measurement 2 Controller Configure resources1Fetch statistics2(Re)Configure resources1.
1 BRICK: A Novel Exact Active Statistics Counter Architecture Nan Hua 1, Bill Lin 2, Jun (Jim) Xu 1, Haiquan (Chuck) Zhao 1 1 Georgia Institute of Technology.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
George Varghese (based on Cristi Estan’s work) University of California, San Diego May 2011 Internet traffic measurement: from packets to insight.
Tracking Port Scanners on the IP Backbone Tao Ye Sprint Burlingame, CA Avinash Sridharan University of Southern California.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon Joint work with Iddo Hanniel and Isaac Keslassy Technion, Israel 1.
Authors: Haiquan (Chuck) Zhao, Hao Wang, Bill Lin, Jun (Jim) Xu Conf. : The 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems.
Author: Sriram Ramabhadran, George Varghese Publisher: SIGMETRICS’03 Presenter: Yun-Yan Chang Date: 2010/12/29 1.
Resource/Accuracy Tradeoffs in Software-Defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan HotSDN’13.
A Formal Analysis of Conservative Update Based Approximate Counting Gil Einziger and Roy Freidman Technion, Haifa.
1 LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in Network Data Streams Qun Huang and Patrick P. C. Lee The Chinese.
Performed by: Amir Shmul, Or Yochanan Instructor: Mony Orbach, Erez Tsidon המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון.
IEEE HPSR 2014 Scaling Multi-Core Network Processors Without the Reordering Bottleneck Alex Shpiner (Technion / Mellanox) Isaac Keslassy (Technion) Rami.
Nick McKeown1 Building Fast Packet Buffers From Slow Memory CIS Roundtable May 2002 Nick McKeown Professor of Electrical Engineering and Computer Science,
The Bloom Paradox Ori Rottenstreich Joint work with Yossi Kanizo and Isaac Keslassy Technion, Israel.
D 陳怡安 R 解巽評 R 高榮泰 IEEE/ACM TRANSACTIONS ON NETWORKING OCTOBER 2006 Cristian Estan, George Varghese, Member, IEEE, and Michael Fisk.
CPS3340 COMPUTER ARCHITECTURE Fall Semester, /3/2013 Lecture 9: Memory Unit Instructor: Ashraf Yaseen DEPARTMENT OF MATH & COMPUTER SCIENCE CENTRAL.
The Bloom Paradox Ori Rottenstreich Joint work with Isaac Keslassy Technion, Israel.
We used ns-2 network simulator [5] to evaluate RED-DT and compare its performance to RED [1], FRED [2], LQD [3], and CHOKe [4]. All simulation scenarios.
Block-Based Packet Buffer with Deterministic Packet Departures Hao Wang and Bill Lin University of California, San Diego HSPR 2010, Dallas.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
SCREAM: Sketch Resource Allocation for Software-defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat (CoNEXT’15)
High Speed Networks Need Proactive Congestion Control
SketchVisor: Robust Network Measurement for Software Packet Processing
Constant Time Updates in Hierarchical Heavy Hitters
Data Streaming in Computer Networking
The Variable-Increment Counting Bloom Filter
Tapping Into The Unutilized Router Processing Power
Computer Architecture & Operations I
CONGESTION CONTROL.
Optimal Elephant Flow Detection Presented by: Gil Einziger,
Qun Huang, Patrick P. C. Lee, Yungang Bao
SCREAM: Sketch Resource Allocation for Software-defined Measurement
BRICK: A Novel Exact Active Statistics Counter Architecture
Memento: Making Sliding Windows Efficient for Heavy Hitters
Constant Time Updates in Hierarchical Heavy Hitters
By: Ran Ben Basat, Technion, Israel
Network-Wide Routing Oblivious Heavy Hitters
Heavy Hitters in Streams and Sliding Windows
By: Ran Ben Basat, Technion, Israel
Author: Yi Lu, Balaji Prabhakar Publisher: INFOCOM’09
Lu Tang , Qun Huang, Patrick P. C. Lee
Techniques for Fast Packet Buffers
Presentation transcript:

CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon (Technion, Israel) Joint work with Iddo Hanniel and Isaac Keslassy ( Technion ) 1

Network Flow Counters Usage  Network management applications require per-flow counters, for example:  Congestion Control  Detection of Denial of Service Attacks  Detection of Traffic Anomalies  Counter types:  Packet counting  Byte counting  Rate measurement 2

Switch Example  40MB memory  32nsec for single counter access DRAM is too slow SRAM is too expensive 3 SWITCH 10 6 flows Total Packet Count Total Byte Count Packet Rate Count event A Count event B per-flow counters 64-bit width Min packet size = 40B Link Rate 10Gbps

Suggested Solutions  Hybrid SRAM-DRAM counters [Shah, Iyer, Prabhakar and McKeown ’02]  Cannot support fast reading  Counter Braids – compress counters into small SRAM [Y. Lu et al ’08]  Cannot decompress in real time  Heavy Hitters – store only high counters [Estan and Varghese ’03]  No records of small counter values 4

Counter Estimation Solutions  Intuitively we want counters to be as precise as possible, unbiased whenever possible, and scalable  SAC – R. Stanojevic, “Small Active Counters”, 2007 SAC  Exponent-Magnitude representation  Unbiased estimation  Scalable Restricted to specific representation which prevents error optimization  DISCO – C. Hu et al, “DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement”, 2010 DISCO  Convex conversion function that reduces increment values  Unbiased estimation Restricted to a close function representation. No scaling 5

Our Contributions  CEDAR – decoupling counters from estimators  Optimal estimators for the min-max relative error  Dynamic up-scale algorithm  Exponential-averaged rate estimation 6

Counter-Estimators Decoupling 7 995, ,000, Counter estimates F N-1 F N-2 F1F1 F0F0 1,000, , p(L-2) p(1) p(L-1) p(1) A L-1 A L-2 A1A1 A0A0 3.7 A2A2 Flow pointers Shared estimators log 2 L q F N-1 F N-2 F1F1 F0F0

CEDAR Structure  N flows  L estimators  Flow array:  Estimation array:  Estimator differences: 8 1,000, , p(L-2) p(1) p(L-1) p(1) A L-1 A L-2 A1A1 A0A0 3.7 A2A2 Flow pointers Shared estimators log 2 L q F N-1 F N-2 F1F1 F0F0

CEDAR Increment Algorithm A3A3 A2A2 A1A1 0 A0A A7A7 A6A6 A5A5 A4A time p=1 p=1/3 p=1/5 t=0t=1t=2t=3 9 Upon packet arrival: with probability

Performance Measures  Traffic Amount –  - a random variable that represents the number of real counter increments in order for to hit estimator  Relative error – Coefficient of Variation: 10

Min-Max Relative Error  Problem: assuming L and A L-1 are given, find an estimation array that minimizes the guaranteed relative error δ such that  Solution: equal relative error  Estimation values 11

Equal Relative Error Example 12 Estimation Values Relative Error δ δ A1A1 A2A2 A3A3 A1A1 A2A2 A3A3 δ A1A1 A2A2 A3A3

Capacity Region of Static CEDAR 13 Example: 10-bit counters Max value 10^6  min-max relative error 8%

4.5 1 Up-Scale Procedure 3 1 A3A3 A2A2 A1A1 0 A0A A7A7 A6A6 A5A5 A4A p=0.5 0 p=0.43 =(54-24)/(93-24) A’A’’ upscale threshold Initial relative error δ 0 Increase the relative error δ 0 + δ step

CEDAR Unbiasedness 15

CEDAR Equal Error 16

CEDAR Vs. SAC & DISCO 12-bit estimators

CEDAR Vs. SAC & DISCO 8-bit estimators

CEDAR Error Adjustment 12-bit 19

CEDAR Implementation on FPGA Gbps 12K gates

Exponential-Average Rate Estimation A3A3 A2A2 A1A1 A0A0 A7A7 A6A6 A5A5 A4A4 time x0.98 down-scale P = 0.02x100/(85-68) Incoming packet t0t0 t 0 + 1t x0.98 down-scale

Exponential-Average Rate Estimation A3A3 A2A2 A1A1 A0A0 A7A7 A6A6 A5A5 A4A4 time t t up-scaling P = ( )/(85-68) After 8 more down-scaling cycles

EXP-CEDAR 7-bit 23  Real exp-average with 64 bits  For 10^(-2) precision – 14 bits are required

EXP-CEDAR 9-bit 24

CEDAR Summary  Decoupling - flexible estimators  Unbiased and scalable estimation  Attains the min-max relative error  FPGA supports link rate of 5.4Gbps and may increase to tens of Gbps on ASIC  Exponential-average rate estimation 25

Thank you. 26