On Internet Traffic Dynamics and Internet Topology II Internet Model Validation Walter Willinger AT&T Labs-Research

Slides:



Advertisements
Similar presentations
Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Advertisements

Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
DYNAMICS OF RANDOM BOOLEAN NETWORKS James F. Lynch Clarkson University.
Quantifying Overprovisioning vs. Class-of-Service: Informing the Net Neutrality Debate Murat Yuksel (University of Nevada – Reno) K.
Modeling, Simulation and Measurements of Queuing Delay under Long-tail Internet Traffic Michele Garetto Politecnico di Torino, Italy Don Towsley University.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
2  Something “feels the same” regardless of scale 4 What is that???
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Slides adapted from Paul Barford (UWisconsin), Matt Roughan (U Adelaide), Jennifer Rexford (Princeton)
TCP Stability and Resource Allocation: Part II. Issues with TCP Round-trip bias Instability under large bandwidth-delay product Transient performance.
1 Self-Similar Wide Area Network Traffic Carey Williamson University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
October 14, 2002MASCOTS Workload Characterization in Web Caching Hierarchies Guangwei Bai Carey Williamson Department of Computer Science University.
Alon Arad Alon Arad Hurst Exponent of Complex Networks.
Statistics & Modeling By Yan Gao. Terms of measured data Terms used in describing data –For example: “mean of a dataset” –An objectively measurable quantity.
On the Constancy of Internet Path Properties Yin Zhang, Nick Duffield AT&T Labs Vern Paxson, Scott Shenker ACIRI Internet Measurement Workshop 2001 Presented.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Small scale analysis of data traffic models B. D’Auria - Eurandom joint work with S. Resnick - Cornell University.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
Variance of Aggregated Web Traffic Robert Morris MIT Laboratory for Computer Science IEEE INFOCOM 2000’
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
CSE 561 – Traffic Models David Wetherall Spring 2000.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
Estimating Congestion in TCP Traffic Stephan Bohacek and Boris Rozovskii University of Southern California Objective: Develop stochastic model of TCP Necessary.
Connection Admission Control Schemes for Self-Similar Traffic Yanping Wang Carey Williamson University of Saskatchewan.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
Investigating Forms of Simulating Web Traffic Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA.
CS 6401 Network Traffic Characteristics Outline Motivation Self-similarity Ethernet traffic WAN traffic Web traffic.
Internet Traffic Modeling Poisson Model vs. Self-Similar Model By Srividhya Chandrasekaran Dept of CS University of Houston.
Self-Similar Traffic COMP5416 Advanced Network Technologies.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
Applications of Poisson Process
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
Panel Topic: After Long Range Dependency (LRD) discoveries, what are the lessons learned so far to provide QoS for Internet advanced applications David.
References for M/G/1 Input Process
Network Traffic Modeling Punit Shah CSE581 Internet Technologies OGI, OHSU 2002, March 6.
Traffic Modeling.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Distributions of Randomized Backtrack Search Key Properties: I Erratic behavior of mean II Distributions have “heavy tails”.
Cascading Failure and Self-Organized Criticality in Electric Power System Blackouts Ian Dobson ECE, Univ. of Wisconsin David Newman Physics, Univ. of Alaska.
COMPSAC'14 - N. Larrieu /07/ How to generate realistic network traffic? Antoine VARET and Nicolas LARRIEU COMPSAC – Vasteras – July the 23.
Interacting Network Elements: Chaos and Congestion Propagation Gábor Vattay Department of Physics of Complex Systems Eötvös University, Budapest, Hungary.
Measuring the Congestion Responsiveness of Internet Traffic Ravi Prasad & Constantine Dovrolis Networking and Telecommunications Group College of Computing.
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
Low-Dimensional Chaotic Signal Characterization Using Approximate Entropy Soundararajan Ezekiel Matthew Lang Computer Science Department Indiana University.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Chapter 10 Verification and Validation of Simulation Models
A Nonstationary Poisson View of Internet Traffic Thomas Karagiannis joint work with Mart Molle, Michalis Faloutsos, Andre Broido.
On Internet Traffic Dynamics and Internet Topology I High Variability Phenomena Walter Willinger AT&T Labs-Research [This is joint.
Self-generated Self-similar Traffic Péter Hága Péter Pollner Gábor Simon István Csabai Gábor Vattay.
Rice University, SPiN Group spin.rice.edu Multiscale Traffic Processing Techniques for Network Inference and Control R. Baraniuk R. Nowak E. Knightly R.
Rice University, SPiN Group spin.rice.edu Multiscale Traffic Processing Techniques for Network Inference and Control R. Baraniuk R. Nowak E. Knightly R.
Risk Analysis Workshop April 14, 2004 HT, LRD and MF in teletraffic1 Heavy tails, long memory and multifractals in teletraffic modelling István Maricza.
1 Hailuoto Workshop A Statistician ’ s Adventures in Internetland J. S. Marron Department of Statistics and Operations Research University of North Carolina.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
1 Interesting Links. On the Self-Similar Nature of Ethernet Traffic Will E. Leland, Walter Willinger and Daniel V. Wilson BELLCORE Murad S. Taqqu BU Analysis.
Internet Measurement (and some inference & modeling)
Internet Traffic Modeling
Chapter 10 Verification and Validation of Simulation Models
Notices of the AMS, September 1998
CPSC 641: Network Traffic Self-Similarity
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Internet Traffic Analysis: Coseners, 2019 Mohammed Alasmar ‘19.
Presentation transcript:

On Internet Traffic Dynamics and Internet Topology II Internet Model Validation Walter Willinger AT&T Labs-Research

Topics Covered  Self-similar network traffic  Mandelbrot’s legacy  Self-similarity through high variability  A new model validation framework  Illustrations of validation framework  Self-similar traffic vs. Poisson  Chaos and self-similarity  SOC and the Internet  The “New Science of Networks” and the Internet  Lessons learned

Time scale: 100 sec 10 msec Time scale factor: 10 at each step Time scale: 100 sec 10 msec Time scale factor: 10 at each step

Time scale: 100 sec 10 msec Varibility scales like 10^(-0.8) at each step Time scale: 100 sec 10 msec Variability scales like 10^(-0.5) at each step

Mandelbrot’s Construction  Renewal reward processes and their aggregates  Aggregate is made up of many constituents  Each constituent is of the on/off type  On/off periods have a “duration”  Constituents make contributions (“rewards”) when “on”  Constituents make no contributions when “off”  What can be said about the aggregate?  In terms of assumed type of “randomness” for durations and rewards  In terms of implied type of “burstiness”

A Closely Related Construction  Cox’s construction  Aggregate traffic is made up of many connections  Connections arrive at random  Each connection has a “size” (number of packets)  Each connection transmits packets at some “rate”  The limiting regimes for the aggregate are essentially the same as those for Mandelbrot’s construction  Also called immigration-death or M/G/  process

Mandelbrot’s Types of “Randomness”  Distribution functions/random variables  “Mild” → finite variance (Gaussian)  “Wild” → infinite variance (heavy tails)  Correlation function of stochastic process  “Mild” → short-range dependence (SRD, Markovian)  “Wild” → long-range dependence (LRD)

Mandelbrot’s Types of “Burstiness” Bursty BURSTY smooth bursty Distribution function Mild Wild SRD LRD Correlation structure Tail-driven burstiness (“Noah effect”) Dependence-driven burstiness (“Joseph effect”)

Type of Burstiness: “Smooth” Correlation Function r(n) lag n on linear scale r(n) on log scale CCDF Function 1-F(x) x on linear scale 1-F(x) on log scale Log-linear scales

Type of Burstiness: “bursty” Correlation Function r(n) lag n on log scale r(n) on log scale CCDF Function 1-F(x) x on linear scale 1-F(x) on log scale Log-linear scale Log-log scale

Type of Burstiness: “Bursty” Correlation Function r(n) lag n on linear scale r(n) on log scale CCDF Function 1-F(x) x on log scale 1-F(x) on log scale Log-log scale Log-linear scale ?

Type of Burstiness: “BURSTY” CCDF Function 1-F(x) x on log scale 1-F(x) on log scale Correlation Function r(n) lag n on log scale r(n) on log scale ? ? Log-log scales

Mathematical Framework  Mathematical abstraction  Ignores most transport-specific features  Assumes unlimited link bandwidth  Consider (normalized) double-limit process  Large M (many users), large T (coarse time scale)  Large M limit, then large T limit: “TCP-type” behavior  Large T limit, then large M limit: “UDP-type” behavior   with the aggregated total workload from 0 to u

Mathematical Result (1)  Assumed “randomness”  Durations are heavy-tailed with infinite variance  Rewards are 0/1  Large M-limit, then large T-limit (TCP-like transport)  “Mild” marginals (Gaussian)  “Wild” correlations (LRD)  Limit process  Fractional Brownian motion  Aggregate of many long, thin flows

Web servers application traffic is streamed out on the net creating Internet traffic Web client Let’s look at Internet traffic over some link

Link Internet traffic

Web traffic … … is streamed onto the Internet … … creating “bursty- looking” link traffic time X = “wild” HTTP Requests/responses Y = “colored” noise (TCP-type transport)

Mathematical Result (2)  Assumed “randomness”  Durations are heavy-tailed with infinite variance  Rewards are 0/1  Large T-limit, then large M-limit (UDP-like transport)  “Wild” marginals (stable)  “Mild” correlations (independence)  Limit process  Levy stable motion  Aggregate of many short, fat flows

Web traffic … … is streamed onto the Internet … … creating “bursty- looking” link traffic time X = “wild” HTTP requests/responses Y = “stable” noise (UDP-type transport)

A New Model Validation Approach  Traditional framework for model validation  Model “fits” or “describes” the data “well”  “Well” according to a goodness-of-fit criterion  Model results in comparable performance  Need for a paradigm shift  New mathematical constructions ensure good “fit”  Standard goodness-of-fit criteria perform poorly with “voluminous” or “unusual” data (LRD, heavy tails)  Performance may be comparable, but wrong (e.g., due to neglecting crucial feedback regulation)

The “Closing the Loop” Approach 1.Discovery (data-driven) 2.Proposed explanation in terms of elementary concepts or mechanisms (mathematics) 3.Step 2 suggests first-of-its-kind measurements or revisiting existing measurements related to checking the elementary concepts or mechanisms 4.Empirical validation of elementary concepts or mechanisms using the data collected in Step 3

Why “Closing the Loop” is Progress  Departure from classical “data-fitting”  Validation is moved to a more elementary or fundamental level  Fully exploits the context in which measurements are made (“start with data, end with data”)  If successful, provides actual explanation of “emergent” phenomena (new insight)  Shows inherent limitations and weaknesses of proposed model, suggests further improvements

Illustration of the “Closing the Loop” Approach  Self-similarity through high variability  Self-similar traffic vs. Poisson  Chaos and self-similarity  Self-organized criticality (SOC) and the Internet  The “New Science of Networks” and the Internet

Example 0: Self-Similarity – High Variability  Discovery: Self-similar nature of aggregate traffic on a link  Mathematics: Mandelbrot/Cox construction  Suggested new measurements  Session/flow/connection sizes  Analysis of new measurements  Check session/flow/connection size distributions

Theory-based IP Flow Property

Measured IP Flow Sizes

Example 1: Poisson vs. Self-Similar  Lucent Press Release, June 6,  Cao, Cleveland, Lin, and Sun, ”Internet traffic tends toward Poisson and Independent as the Load Increases” (2002)

Claims and Supporting Evidence  Claims  Internet traffic tends to Poisson and independent as the load increases  Packet interarrival times (of aggregate traffic) become exponentially distributed and independent as the link load increases  Supporting evidence  2526 packet traces, 5 min or 90 sec in duration  Impressive-looking statistical analysis of traces

Bottom-line  Specious claims based on impressive-looking, but specious analysis of the data  Specious nature of the claims are revealed by a straightforward application of the “closing the loop” concept  Reminder (J.W. Tukey, 1975) “Often the purpose of good analysis is not so much to do well in catching what you want but rather to well … in rejecting what you don’t want.”

Example 2: Chaos and Self-Similarity  Infocom 2000, Best Paper Award   Veres and Boda,”The chaotic nature of TCP congestion control” (2000)

Claims and Supporting Evidence  Claims  TCP itself, as a deterministic process, creates chaos, which generates self-similarity  Approach taken  Simulation study based on ns  Chaos theory-inspired analysis of simulated trace data (phase plots, attractors, Lyapunov exponent)  Ad-hoc testing of self-similarity

Bottom-line  Specious claim as a result of a specious experiment/simulation/analysis  Considerable, not-so-solid follow-up work  ns can generate pseudo-chaotic observations  Reminder (Floyd and Paxson, 2001) “Network simulators make it easier for researchers to create simulations, but the researchers themselves remain responsible for making their use of simulation relevant and insightful, rather than irrelevant or misleading.”

Example 3: Self-Organized Criticality (SOC) and the Internet  Csabi, “1/f noise in computer network traffic” (1994)  Ohira and Sawatari, “Phase transition in computer traffic models” (1998)  Yuan, Ren, and Shan, “Self-organized criticality in a computer network model” (2000)  Sole and Valverde, “Information transfer and phase transitions in a model of Internet traffic” (2001)

Claims and Supporting Evidence  (Selected) Claims  Self-similar traffic traffic is the result of a phase transition  There exist deep links between Internet traffic and highway traffic  Approach  Simulation-based studies (cellular automata)  Ignores Internet-specific “details” for the sake of addressing “fundamental” issues

Bottom-line  Specious claims as a result of a specious model  Specious nature of the claims is revealed by a trivial “closing the loop” argument  Building a network with the claimed properties seems feasible but is not recommended!  Reminder (Floyd and Paxson, 2001) “Simulation carries with it the risk of using a model simplified to the point where key facets of Internet behavior have been lost, in which case any ensuing results could be useless (though they may not appear to be so.”

Example 4: The “New Science of Networks” and the Internet  Nature, July 2000, “Achilles’ heel of the Internet’’  Albert, Jeong, and Barabasi, “Error and attack tolerance of complex networks” (2000)  A.-L. Barabsi, “Linked: The New Science of Networks” (2002)

Claims and Supporting Evidence  (Selected) Claims  The Internet topology is “scale-free”  The Internet topology is robust to random attack, but highly vulnerable to targeted attacks (“Achilles’ heel”)  Approach taken  Develop new class of “scale-free” graphs  Model Internet topology as “scale-free” graph  Simulation studies with “scale-free” graphs

Bottom-line  Specious claims as a result of specious models for Internet connectivity  Shows the power of the “closing the loop” concept  Building an Internet with “scale-free” properties may be possible, but is not recommended!  The “New Science of Networks” has little networking relevance (so far!)

Lesson Learned  Expect specious claims and theories about the Internet [“specious” – having deceptive attraction or allure, or having a false look of truth or genuiness]  Press releases (URL’s), accepted INFOCOM papers (even if they get the Best Paper Award), published articles in Nature or Science (especially on Internet-related topics), etc. can be wrong!