Measurement, Modeling and Analysis of the Internet Wang Xiaofei Vishal Misra, Columbia University.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Energy-Efficient Congestion Control Opportunistically reduce link capacity to save energy Lingwen Gan 1, Anwar Walid 2, Steven Low 1 1 Caltech, 2 Bell.
Restless bandits and congestion control Mark Handley, Costin Raiciu, Damon Wischik UCL.
Transport Layer3-1 TCP AIMD multiplicative decrease: cut CongWin in half after loss event additive increase: increase CongWin by 1 MSS every RTT in the.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Stability of computer network for the set delay Jolanta Tańcula.
Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.
Simulating Large Networks using Fluid Flow Model Yong Liu Joint work with Francesco LoPresti, Vishal Misra Don Towsley, Yu Gu.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
TCP Stability and Resource Allocation: Part II. Issues with TCP Round-trip bias Instability under large bandwidth-delay product Transient performance.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Texas A&M University Improving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control Sumitha.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
A Comparison of Layering and Stream Replication Video Multicast Schemes Taehyun Kim and Mostafa H. Ammar.
Source-Adaptive Multilayered Multicast Algorithms for Real- Time Video Distribution Brett J. Vickers, Celio Albuquerque, and Tatsuya Suda IEEE/ACM Transactions.
AQM for Congestion Control1 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden.
Network Coding and Reliable Communications Group DAWN PI meeting – October 2009 Network coding with unreliable, unknown bandwidths Muriel Medard EECS RLE.
TCP Stability and Resource Allocation: Part I. References The Mathematics of Internet Congestion Control, Birkhauser, The web pages of –Kelly, Vinnicombe,
6/16/20151 On Designing Improved Controllers for AQM Routers Supporting TCP flows By C.V Hollot, Vishal Mishra, Don Towsley and Wei-Bo Gong Presented by.
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
Measurement, Modeling, and Analysis of the Internet: Part II.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Vishal Misra Wei-Bo Gong Don Towsley University of Massachusetts,
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Optical Ring Networks Research over MAC protocols for optical ring networks with packet switching. MAC protocols divide the ring bandwidth according to.
Random Early Detection Gateways for Congestion Avoidance
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
Low-Rate TCP-Targeted Denial of Service Attacks Presenter: Juncao Li Authors: Aleksandar Kuzmanovic Edward W. Knightly.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware Aug 19th / 2004 Rafael Nunez.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
1 A State Feedback Control Approach to Stabilizing Queues for ECN- Enabled TCP Connections Yuan Gao and Jennifer Hou IEEE INFOCOM 2003, San Francisco,
Diffusion Early Marking Department of Electrical and Computer Engineering University of Delaware May / 2004 Rafael Nunez Gonzalo Arce.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
The Effects of Systemic Packets Loss on Aggregate TCP Flows Thomas J. Hacker May 8, 2002 Internet 2 Member Meeting.
Network Aware Resource Allocation in Distributed Clouds.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
“The Geography of the Internet Infrastructure: A simulation approach based on the Barabasi-Albert model” Sandra Vinciguerra and Keon Frenken URU – Utrecht.
1 Spectral Analysis of Power-Law Graphs and its Application to Internet Topologies Milena Mihail Georgia Tech.
Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Vishal Misra Wei-Bo Gong Don Towsley University of Massachusetts,
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
High-speed TCP  FAST TCP: motivation, architecture, algorithms, performance (by Cheng Jin, David X. Wei and Steven H. Low)  Modifying TCP's Congestion.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
1 Optical Packet Switching Techniques Walter Picco MS Thesis Defense December 2001 Fabio Neri, Marco Ajmone Marsan Telecommunication Networks Group
The Impact of Active Queue Management on Multimedia Congestion Control Wu-chi Feng Ohio State University.
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
AQM & TCP models Courtesy of Sally Floyd with ICIR Raj Jain with OSU.
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
1 Time-scale Decomposition and Equivalent Rate Based Marking Yung Yi, Sanjay Shakkottai ECE Dept., UT Austin Supratim Deb.
Winter 2008CS244a Handout 81 CS244a: An Introduction to Computer Networks Handout 8: Congestion Avoidance and Active Queue Management Nick McKeown Professor.
1 Analysis of a window-based flow control mechanism based on TCP Vegas in heterogeneous network environment Hiroyuki Ohsaki Cybermedia Center, Osaka University,
Chapter 11.4 END-TO-END ISSUES. Optical Internet Optical technology Protocol translates availability of gigabit bandwidth in user-perceived QoS.
ECEN 619, Internet Protocols and Modeling Prof. Xi Zhang Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions.
Tango1 Considering End-to-End QoS Constraints in IP Network Design and Planning M.Ajmone Marsan, M. Garetto, E. Leonardi. M. Mellia, E. Wille Dipartimento.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Router-Assisted Congestion Control
The Impact of Multihop Wireless Channel on TCP Performance
Javad Ghaderi, Tianxiong Ji and R. Srikant
Understanding Congestion Control Mohammad Alizadeh Fall 2018
Presentation transcript:

Measurement, Modeling and Analysis of the Internet Wang Xiaofei Vishal Misra, Columbia University

Traffic Modeling 2 TCP Modeling & Congestion Control 3 Conclusion 5 Content Introduction 1 Topology Modeling 4

1.Introduction

1.Introduction  Why?  Impossible to replicate the Internet in our lab and study it as a whole  So…to analyze network measurements and their transformation into models, to help explain the Internet’s functionality and improve its performance.  Traffic Models  TCP Models  Topology Models

2.Traffic Modeling

2.Traffic Modeling  Early Modeling:  “Poisson distribution model” Limited behavior of an aggregate traffic flow created by multiplexing large number of independent flowsLimited behavior of an aggregate traffic flow created by multiplexing large number of independent flows RandomRandom  “Big Bang” in 1993 “On the Self-similar Nature of Ethernet Traffic”  “Self-similar” behavior has serious implications for design, control, analysis of high-speed and large-coverage network…

 Self-Similarity  It describes the phenomenon in which the behavior of a process is preserved regardless of scaling in space or time  Long Ranged Dependence  The behavior of a time-dependent process shows significant correlations across large time scales 2.Traffic Modeling

“Self-Similarity”

 “Self-similar” 2.Traffic Modeling

 Open Loop Model Aggregate traffic is made up of many connections randomlyAggregate traffic is made up of many connections randomly Each connection has a “size” and transmits packets at some “rate”Each connection has a “size” and transmits packets at some “rate” Previous traffic has NO impact on following packetsPrevious traffic has NO impact on following packets  “M/G/infinity traffic model”  Problem: Less than 10% of network traffics are open loop.Less than 10% of network traffics are open loop. “always misleading”“always misleading” 2.Traffic Modeling

2.Traffic Modeling  Closed Loop Model 90% network traffics are closed loop90% network traffics are closed loop Future transmission depends on previous packetsFuture transmission depends on previous packets FeedbackFeedback Closed loop behavior induces correlations independently of file size distributionClosed loop behavior induces correlations independently of file size distribution  Chaotic dynamics “Chaos”?“Chaos”? –nonlinearity –unpredictability –order in disorder –"butterfly effect"

2.Traffic Modeling  Combined (structural) Models Internet protocol hierarchy is layeredInternet protocol hierarchy is layered Different layers act at different timescaleDifferent layers act at different timescale Short time scale behavior can be quite different from long time scaleShort time scale behavior can be quite different from long time scale

3.TCP Modeling

3.TCP Modeling  TCP throughput modeling: Hot in 90s  TCP Congestion Control “Window”  Increase window by 1 per RTT if no loss W  W+1W  W+1  Decrease by half on detection of loss W  W / 2W  W / 2

3.TCP Modeling  SDE Model  Stochastic Differential Equation

3.TCP Modeling  RED Model  Random Early Detect  Proactively mark or drop packets Prevent congestion by reacting earlyPrevent congestion by reacting early Probability based on average queue lengthProbability based on average queue length  …

4.Topology Modeling

 Why?  Performance of networks critically dependent on topology  Early models  “Erdos-Renyi” random graphs Nodes randomly distributed on 2D planeNodes randomly distributed on 2D plane Connected to each other with probability inversely proportional to distance.Connected to each other with probability inversely proportional to distance.  BUT, random graphs didn’t represent real world networks 4.Topology Modeling

 Real World Network Topologies?  Hierarchical structure  Specialized nodes and Connectivity  Redundancy  GT-ITM simulator  “Georgia Tech Inter-network Topology Models”  Real world network topology & traffic…  BUT… 4.Topology Modeling

4.Topology Modeling  “A Huge Bang”  “Power Law” in 1999, by Faloutsos 3 Frequency of websites, whose hit numbers are larger than x, is proportional to X -a Poisson Power Law Visit number of all websites in Internet

4.Topology Modeling  Power Law everywhere!  “High desired degree - Low frequency” Internet websites visit numberInternet websites visit number Frequency of highly-used words in a LanguageFrequency of highly-used words in a Language Salary distribution of the whole countrySalary distribution of the whole country “2 - 8 rule”“2 - 8 rule” Private lands and apartments…Private lands and apartments…  “Unfair” but “Real”  Internet traffic also obey Power law…  GT-ITM didn’t give power law graphs…

4.Topology Modeling  Power Law Graphs  Power Law Random Graph (PLRG) assign degrees to nodes from power law distributionassign degrees to nodes from power law distribution create k copies of node v; k is the degree of vcreate k copies of node v; k is the degree of v randomly match nodes in pool…randomly match nodes in pool…

4.Topology Modeling  “Barabasi Model” New node connect to node i with probabilityNew node connect to node i with probability probability(i  j) = ki / kj

 General linear preference Greater flexibility in assigning preferenceGreater flexibility in assigning preference By preference parameterBy preference parameter  Inet...  … 4.Topology Modeling

 Topology constraints!  Technology: Processing speedProcessing speed Either a large number of low bandwidth connections, or a small number of high bandwidth connections…Either a large number of low bandwidth connections, or a small number of high bandwidth connections…  Geography Connectivity driven by geographical proximityConnectivity driven by geographical proximity  Economy Capacity of links is constrained by the capacity of nodes.Capacity of links is constrained by the capacity of nodes. “Economization”“Economization” 4.Topology Modeling

 Optimization Based Models  HOT-1 Highly Optimized Tolerances Each new node solves the local optimization problem to find a target node to connect to…Each new node solves the local optimization problem to find a target node to connect to…  HOT-2 Heuristically Optimized Tradeoffs  HOT-3: Variant of HOT-2  … 4.Topology Modeling

5.Conclusion

 Traffic Model  “Self-similarity” of  “Self-similarity” of Internet traffic  Open Loop, Closed Loop, Combined…  TCP Model  “Window Algorithm”, RED, SDE, …  Topology Model  “Power Law” Power Law Graph Models…Power Law Graph Models…  Topology constraints Optimization…Optimization… 5.Conclution