Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv6 Victor T. Norman.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
IPv4 - The Internet Protocol Version 4
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Technical Seminar Presentation Presented by :- Plaban Kumar Rout (EC ) “Wireless ATM & Congestion Control ” Presented by Plaban Kumar Rout.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Evaluation of Header Field Entropy for Hash-Based Packet Selection Evaluation of Header Field Entropy for Hash-Based Packet Selection Christian Henke,
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Sampling and Flow Measurement Eric Purpus 5/18/04.
Detecting Traffic Differentiation in Backbone ISPs with NetPolice Ying Zhang Zhuoqing Morley Mao Ming Zhang.
Network Layer Packet Forwarding IS250 Spring 2010
Trajectory Sampling for Direct Traffic Observation Matthias Grossglauser joint work with Nick Duffield AT&T Labs – Research.
Spring 2002CS 4611 Router Construction Outline Switched Fabrics IP Routers Tag Switching.
Nov 11, 2004CS573: Network Protocols and Standards1 IP Routing: OSPF Network Protocols and Standards Autumn
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Gursharan Singh Tatla Transport Layer 16-May
CS 6401 IPv6 Outline Background Structure Deployment.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Internet Protocol (IP)
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Using Measurement Data to Construct a Network-Wide View Jennifer Rexford AT&T Labs—Research Florham Park, NJ
The Saigon CTT Semester 1 CHAPTER 10 Le Chi Trung.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Dr. John P. Abraham Professor UTPA
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
The Internet Protocol Dr. Adil Yousif. 2  IP (Internet Protocol) is a Network Layer Protocol. Orientation.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
CS 4396 Computer Networks Lab
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
ICMPv6 Error Message Types Informational Message Types.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Building A Network: Cost Effective Resource Sharing
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
IP - The Internet Protocol
IP (slides derived from past EE122 sections)
IP - The Internet Protocol
Internet Protocol (IP)
IP - The Internet Protocol
Network Core and QoS.
Intradomain Routing Outline Introduction to Routing
IP - The Internet Protocol
Router Construction Outline Switched Fabrics IP Routers
IP - The Internet Protocol
IP - The Internet Protocol
Network Core and QoS.
Presentation transcript:

Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001

Problem: Which (spatial) path does traffic take? Circuit switched networks (e.g. telephone): Per-call state is maintained =>trivial IP networks: Don’t maintain per- flow information ?

Why is this interesting? Quality of Service depends on traffic management Traffic control Timescale: seconds no human intervention Traffic engineering Timescale: minutes - months Resource allocation Pricing Failover strategies

Options Indirect measurement Uses information on Network model Network state Direct measurement Direct observation of traffic at multiple points in the network

Problems with indirect measurement Behavior of network elements depends on vendor-specific design choices Deliberate sources of randomness to avoid collision Events outside domain (route advertising by neighboring domains) Interactions may be too complex to predict

Direct measurement: Sampling of packets Sample packets that traverse each link Subset of packets used as representative Problem: How do we get the actual path?

Key idea of the paper Use a deterministic hash function over the packet’s content to determine subset of packets Use the same hash function throughout the domain Use second hash function to label packets

Theory Measurement domain represented as a directed graph Packets enter at ingress node exit at egress node Invariance function Packet content without changing fields, e.g. time-to-live field which is decremented each hop

Sampling Hash Function Decides whether or not a given packet should be sampled Deterministic function of the invariant packet content Same function on each link Results in L-bit binary number

Identification Hash Function Entire packet content could be used Aim: limit traffic to measurement collection system Results in m-bit binary number Additional information may be included Length of packet Source, destination

Invariant content Header: three categories of fields Variable fields (not included) E.g., TTL, header checksum, etc. Low entropy fields (not included) Content changes little between packets E.g., version, header length, protocol High entropy fields (included) Source and destination IP, etc. Part of remainder of packet

Ambiguities (f-h)

Dealing with ambiguities Probability that trajectory can be disambiguated depends on network topology and traffic => renormalization of results necessary Safer to discard all duplicate labels (greater loss of samples)

Specification of Hash Functions Ordered bits of invariant part of packet content x are considered as binary integers:  (x) Sampling hash function h(  (x)) =  (x) mod A Identification hash function g(  (x)) =  (x) mod B with A, B positive integers

Identical Packets Automatically ambiguous => lead to biased estimators Question: How much packet content is needed to avoid collisions? Answer: 40 bytes lead to collision probability smaller than 10 -3

Implementation of hashing 40 byte “numbers” are represented by vector of 16 bit words z = (z k,z k-1,…,z 0 ) =  i=0 k z i 2 16i Use 32 bit long division Iteratively compute (z k,z k-1,…,z 0 ) mod A = (z k (z k mod A),…,z 0 ) mod A

Sampling independent of packet content? Note: IP address of source and destination are included in the invariant content! Chi-squared test 40 byte packet prefix => 95% confidence level 20 byte packet prefix results in strong dependence

Optimal Sampling Tradeoff More unambiguous samples => more accuracy More samples => more measurement traffic Optimize for given measurement traffic mn (m bits per sample, n samples) Small m increases collisions Large m means smaller n

(Question to the authors Doesn’t the measurement traffic itself get sampled and thereby add another source of error? … may be part of their future work statement)

Example Service provider wants to determine what fraction of packets on a certain backbone link belongs to a certain customer Compare customer packets observed both on backbone and on access link Total number of packets observed on backbone Real and estimated fractions largely within error bars

Implementation issues Can trajectory sampling be part of next generation of high-speed interfaces? Authors claim “yes”: Compute both hash functions in parallel Processor cost negligible compared with cost of interface cards Processor speed doubles every 18 months, maximum trunk speed every 21 months

Other Common Approaches Aggregation-based approaches e.g., sum of packets traversing a link Sampling-based approaches sample subset of observations

Aggregation-based Approaches Link measurements (direct) Traffic statistics (# of bytes / # of packets transferred / dropped) Measurements reported periodically Flow aggregation (indirect) Flow: sequence of packets with common field in header Relies on emulation of routing protocol

Sampling-based Approaches Active end-to-end probes (direct) Hosts send probe packets to one or more other hosts Packet loss rate Round-trip delay End-to-end path characteristics Variation: collect and exchange measurements of multicast session

Related Work Measure end-to-end performance of individual flows ATM cells sampled at ingress and egress points Determine QoS for a single connection, e.g., delay and loss rate

Extensions and Other Applications Distributed denial of service attacks Attackers use packet spoofing Filtering A configurable packet filter may allow trajectory sampling for a subset of packets Probe Packets Packet content may be constructed to ensure sampling

Conclusions Simple processing No Router state required Packets directly observed