Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.

Slides:



Advertisements
Similar presentations
Challenges in Making Tomography Practical
Advertisements

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Traffic Engineering With Traditional IP Routing Protocols
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
Deployment of Surface Gateways for Underwater Wireless Sensor Networks Saleh Ibrahim Advising Committee Prof. Reda Ammar Prof. Jun-Hong Cui Prof. Sanguthevar.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Path Protection in MPLS Networks Using Segment Based Approach.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
Scalable and Deterministic Overlay Network Diagnosis Yao Zhao, Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 Lecture 4 Maximal Flow Problems Set Covering Problems.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Lecture 15. IGP and MPLS D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Optimizing Cost and Performance in Online Service Provider COSC7388 – Advanced Distributed Computing Presented By: Eshwar Rohit
Network Aware Resource Allocation in Distributed Clouds.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Performance Evaluation of ATM Shortcuts in Overlaid IP/ATM Networks Jim Kurose Don Towsley Department of Computer Science Univ. of Massachusetts, Amherst.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
Logical Topology Design
Scalable Multi-Class Traffic Management in Data Center Backbone Networks Amitabha Ghosh (UtopiaCompression) Sangtae Ha (Princeton) Edward Crabbe (Google)
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
Scheduling Optimization in Wireless MESH Networks with Power Control and Rate Adaptation SECON 2006 Antonio Capone and Giuliana Carello Keon Jang 2007.
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Surviving Failures in Bandwidth Constrained Datacenters Authors: Peter Bodik Ishai Menache Mosharaf Chowdhury Pradeepkumar Mani David A.Maltz Ion Stoica.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
1 Network Tomography Using Passive End-to-End Measurements Venkata N. Padmanabhan Lili Qiu Helen J. Wang Microsoft Research DIMACS’2002.
Reliable Multicast Routing for Software-Defined Networks.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati (Fellow IEEE) IEEE Transactions on Mobile Computing, March 2012.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
1 Network Tomography Using Passive End-to-End Measurements Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Slide 1 Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks Donghoon Shin, Saurabh Bagchi and Chih-Chun.
Data Driven Resource Allocation for Distributed Learning
A Study of Group-Tree Matching in Large Scale Group Communications
Presentation transcript:

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan Pei, Jia Wang, AT&T Labs -Research

Page 2 Outline Motivation Problem Definition Monitor Setup Single-round monitoring Multi-round monitoring Evaluation Related Works Conclusion

Page 3 Motivation PE VPN Backbone PE CE VPN 1, Site 2 VPN 2, Site 1 VPN 1, Site 1 PE CE VPN 2, Site 2

Page 4 Motivation VPN performance monitoring Reliability Quality of service (SLA) Approaches Passive measurements: SNMP-based Monitoring – Fixed poll rate – Difficult to measure end-to-end path-level features (e.g. delay, bw) Active measurements – Operational constraints E.g. monitor, link, path constraints

Page 5 Problem Definition PE VPN Backbone PE CE VPN 2, Site 2 VPN 2, Site 1 VPN 1, Site 1 PE CE VPN 1, Site 2 Goal: continuously monitoring and diagnosing VPN performance under operational constraints Each monitor can measure <=c paths Each replier can reply <=r paths Each link is on <=b measured paths Traffic isolation between VPNs Challenges with operational constraints Optimization problem → constraint satisfactory problem All paths measured simultaneously? X

Page 6 VScope System Architecture Two phases: VScope Setup VScope Operation: monitoring + diagnosis Provides a smooth tradeoff between measurement frequency and monitors deployment/management costs

Page 7 Two Phases Monitor setup phase From certain monitor candidates, how to select minimal number of monitors, which in the measurement phase can measure a selected set of paths that covers all links in the network under the given measurement constraints? NP-hard even without considering constraints Monitoring and fault diagnosis phase When faulty paths are discovered in the path monitoring phase, how to quickly select some paths under the operational constraints to be further measured so that the faulty link(s) can be accurately identified?

Page 8 Two Phases Monitor setup phase From certain monitor candidates, how to select minimal number of monitors, which in the measurement phase can measure a selected set of paths that covers all links in the network under the given measurement constraints? NP-hard even without considering constraints Monitoring and fault diagnosis phase When faulty paths are discovered in the path monitoring phase, how to quickly select some paths under the operational constraints to be further measured so that the faulty link(s) can be accurately identified?

Page 9 Outline Motivation Problem Definition Monitor Setup Single-round monitoring Multi-round monitoring Evaluation Related Works Conclusion

Page 10 Monitoring Strategies … P1P1 … P2P2 … P3P3 … P4P4 … P5P5 … P6P6 … P1P1 … P2P2 … P3P3 … P4P4 … P5P5 … P6P6 t t Single-Round Monitoring Multi-Round Monitoring Round 1 Round 2 Round 1

Page 11 Multi-Round Monitoring Pros Relax tight constraints Reduce number of monitors Cons Less monitoring frequency Monitor Selection Algorithm Consider R rounds of back-to-back measurements Step 1: convert multi-round monitor selection problem to single-round problem and solve the single-round monitor selection problem – Relax monitor & link bw constraints by a factor of R Step 2: schedule paths measured in R rounds

Page 12 Single-Round Monitor Selection Monitor Selection Problem Related to Minimum Set Cover problem NP-hard without constraints [Bejerano, Infocom03] Pure Greedy Algorithm Simple and locally optimized Greedy Assisted Integer Linear Programming based algorithm Linear programming is good at dealing with constraints ILP is NP-hard Need to relax ILP to LP

Page 13 Pure Greedy Algorithm Two-level nested Minimum Set Cover Problem and Maximum Coverage Problem Iteratively select a candidate router as a new monitor that can measure paths covering maximum number of un-covered links before the selection Computing the maximum gain of adding a router as a monitor is a variant of Maximum Coverage problem (also NP-hard) – Iteratively select a path of the router that will not violate the link bandwidth constraints and covers maximum number of un-covered links before the selection – Until the number of selected paths reaches the monitor’s constraint

Page 14 Integer Linear Programming Minimize number of monitors A path is monitored iff the source router is selected as monitor Monitor constraintReplier constraint A link is covered if at least one path containing the link is selected Link bandwidth constraint It is NP-hard!

Page 15 Relaxation with Random Rounding Relax the Integer Linear Programming to Linear Programming Suppose the solution of linear programming is x * i, y * i Rounding rule:

Page 16 Greedy Assisted Linear Programming Use Linear Programming to select a set of monitors and corresponding measurement paths Not all links are covered Use greedy algorithm to cover uncovered links Similar to the pure greedy algorithm

Page 17 Mulit-Round Path Scheduling NP-hard Can reduce minimum graph coloring problem to path scheduling problem Three algorithms Random algorithm – Randomly schedule paths independently – Run random algorithm multiple times to get the best one Greedy algorithm – Minimize link utilization in every step LP based Randomization Algorithm – ILP + relaxation and random rounding Optimization metrics Maximum link violation degree (MLVD) Average link violation degree (ALVD)

Page 18 Outline Motivation Problem Definition Monitor Setup Single-round monitor selection Multi-round monitor selection Evaluation Related Works Conclusion

Page 19 Evaluation Topologies Synthetic topologies generated by BRITE Real topologies from a tier-1 ISP: one IP backbone topology (IP-EX), one VPN backbone topology (VB), and two VPN infrastructure topologies (V1-EX, V2-EX) – Scale from 100s nodes to 100,000s nodes – Heterogeneous real link bw (1.54Mbps ~ 10Gbps) Operational constraints From ISP management team – E.g. percent link bw allowed for probing: 1% Evaluation metrics Percentage of monitors selected Maximum (average) link violation degree after scheduling Running speed

Page 20 Experimental setup Default configuration Monitor constraint = 12 Replier constraint = 24 Probing rate per path = 4 pkt /sec Measurement BW consumed per path = 1.6Kbps Link constraint = 1% x (link capacity)

Page 21 Baseline Monitor Selection Results (VB Topology) LP+Greedy selects fewer monitors. Vary Link Constraint Vary Monitor Constraint

Page 22 Multi-Round Monitor Selection Results (V1-EX Topology) More rounds and fewer monitors and diminishing returns. Vary Link Constraint Vary Monitor Constraint

Page 23 Multi-Round Monitor Selection Results (V1-EX Topology) LP > Random > Greedy. Link violation degree Percentage of links with violation Greedy Random LP

Page 24 Related Work Path Selection The monitoring problem is not considered or too simple Complex path selection goal (basis, SVD, Bayesian experimental design) Monitoring Placement Active Monitoring Systems – Similar problem without operational constraints [Bejerano, Infocom03] – Robustness consideration Passive Monitoring Systems – SNMP Polling – Traffic sampling

Page 25 Conclusions VScope for continuously monitoring & diagnosis Consider operational constraints Design multi-round monitor selection algorithms – Single-round monitor selection – Monitoring path scheduling Evaluated with synthetic and real topologies – Our algorithms are efficient in minimizing number of monitors with low constraint violation

Q & A? Thanks!