Network Coding Tomography for Network Failures

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

RIPPLE Authentication for Network Coding Yaping Li, The Chinese University of Hong Kong Hongyi Yao, Tsinghua University Minghua Chen, The Chinese University.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
General Linear Model With correlated error terms  =  2 V ≠  2 I.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
On error and erasure correction coding for networks and deadlines Tracey Ho Caltech NTU, November 2011.
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
Information and Coding Theory
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
CS774. Markov Random Field : Theory and Application Lecture 16 Kyomin Jung KAIST Nov
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Compressive Data Gathering for Large- Scale Wireless Sensor Networks Chong Luo Feng Wu Shanghai Jiao Tong University Microsoft Research Asia Jun Sun Chang.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 A General Introduction to Tomography & Link Delay Inference with EM Algorithm Presented by Joe, Wenjie Jiang 21/02/2004.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
CISS Princeton, March Optimization via Communication Networks Matthew Andrews Alcatel-Lucent Bell Labs.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Introduction to Boosting Aristotelis Tsirigos SCLT seminar - NYU Computer Science.
Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
. PGM 2002/3 – Tirgul6 Approximate Inference: Sampling.
How To Explore a Fast Changing World (On the Cover Time of Dynamic Graphs) Chen Avin Ben Gurion University Joint work with Michal Koucky & Zvi Lotker (ICALP-08)
The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
Connections between Network Coding and Matroid Theory Qifu Sun Institute of Network Coding (Shenzhen), CUHK 30, Aug., 2013.
Particle Filtering in Network Tomography
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
1 The edge removal problem Michael Langberg SUNY Buffalo Michelle Effros Caltech.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.
Achieving Convergence-Free Routing using Failure-Carrying Packets K. Lakshminarayanan et al. Presented by Ang Li 06/29/07.
Computer Science Division
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
- A Maximum Likelihood Approach Vinod Kumar Ramachandran ID:
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
William Stallings Data and Computer Communications
Distributed Network Codes
Network Coding and its Applications in Communication Networks
MinJi Kim, Muriel Médard, João Barros
Amplify-and-Forward Schemes for Wireless Communications
ECE 544 Protocol Design Project 2016
IEEE Student Paper Contest
Normal Form (Matrix) Games
Presentation transcript:

Network Coding Tomography for Network Failures Hongyi Yao Sidharth Jaggi Minghua Chen

Computerized Axial Tomography (CAT Scan) 1

Tomography Heart Y=TX T? 2

Network Tomography [V96]… 3 Objectives: Topology estimation Failure localization @#$%&* 001001 Failure type: Adversarial error: The corrupted packets are carefully chosen by the enemies for specific reasons. Random error: The network packets are randomly polluted. 3

Tomography type Active tomography[RMGR04,CAS06]: All network nodes work cooperatively for tomography. Probe packets from the sources are required. Heavy overhead on computation & throughput. Passive tomography [RMGR04, CA05, Ho05, This work]: Tomography is done during normal communications. Zero overhead on computation & throughput. 4

Network coding S Network coding suffices to achieve to the optimal throughput for multicast[RNSY00]. Random linear network coding suffices, in addition to its distributed feature and low design complexity[TMJMD03]. m1 m2 m1 m2 am1+bm2 m1+m2 m1 m2 r1 r2 5

Random Linear Network Coding Source: Sends packets. Organized as: Internal Nodes: Random linear coding Sink gets Y: X I v1 v2 v1 a1v1+a2v2 a1v1+a2v2 v2 Information T: Recover Topology [Sharma08] TX Y=T X I = T 6

Network Coding Aids Tomography back Network Coding Aids Tomography Network coding scheme is used by u:x(e3)=x(e1)+2x(e2), x(e4)=x(e1)+x(e2). Routing scheme is used by u: x(e3)=x(e1), x(e4)=x(e2). Probe messages: M=[1, 2] x x=2 x 3+2 2 . e1 e3 3 1 3 2x x 7 3 YE=[3, 2] YM=[1,2] E=YE-YM=[2,0] YE=[7, 5] YM=[5,3] E=YE-YM=[2,2] s r 2 2 u 2 5 2 x x[2,1] x[0,1] x[1,0] x[1,1] x 3+2 x e2 e4 e3 e1 e1 Network coding scheme is enough for r to locate error edge e1. Routing scheme is not enough for r to locate error edge e1. 7

Summary of Contribution Passive tomography for random linear network coding WHY? It turns out that the idea underlying the example holds even the coding is done in a random fashion. Random linear network coding has great advantages. Passive = low overhead. Failure type Topology estimation Failure localization Exponential No result [HLCWK05] Adversary error Exponential Hardness proof [This work] [This work] Exponential No result Random error [FM05,HLCWK05] Polynomial Polynomial [This work] [This work] 8

Core Concept: IRV 1. Relation between IRVs and network structure: 9 Edge Impulse Response Vector (IRV): The linear transform from the edge to the receiver. Using IRVs we can estimate topology and locate failures. 1 [2 9 6] e1 [0 3 2] 3 1 2 e3 3 1 1 3 1. Relation between IRVs and network structure: 2 3 4 2 1 9 3 IRV(e1) is in the linear space spanned by IRV(e2) and IRV(e3). [1 0 0] 2 6 e2 2 1 9 6 2. Unique mapping from edge to IRV: For random linear network coding, two independent edges has independent IRVs with high probability. 9

Network tomography by IRVs The concept of IRV significantly aids network tomography: The relations between IRVs and network structure is used to estimate network topology. The unique mapping between network edge and its IRV is used to locate network failures.

Topology Estimation for Random Errors Why study random failures: For network without errors, the only information about the network is the transform matrix T. Thus recovering network topology is hard [SS08]. Surprisingly, for network with random failures (errors, or packet loss), the IRV of the failure edge will be exposed, letting us recovering network topology efficiently.

Topology Estimation for Random Errors Stage 1: Collect IRVs [2,1] 4 , 2 0 , 0 [1,3] E1= E2= 27 , 15 3 , 3 [0 3 2] 18 , 10 6 , 14 [1,1] [3,2] [0 3 2] <E1> <E2>= < > 10

Topology Estimation for Random Errors Stage 2: Recover topology [2 9 6] [0 0 4] [0 3 2] [2 9 6] [0 0 4] IRVs from Stage 1: [0 3 2] [0 0 2] According to: IRV(e1) is in the linear space spanned by IRV(e2) and IRV(e3). [1 0 0] [0 1 0] [0 0 1] e1 e2 e3 11

Random Failure Localization Exp Preliminaries: The Impulse Response Vector (IRV) of each edge. As long as the topology is given, we can do error localization. [4 27 18] [2 15 10] [2 9 6] [0 3 2] [0 0 2] [0 0 4] [0 1 0] [0 0 1] [1 0 0] [2 9 6] [0 3 2] IRVs: in < >? [2 9 6] [2,1] [0 3 2] [3,2] Locating random failures: [2 9 6] [0 3 2] 4 , 2 E= [2,1] + [3,2] = 27 , 15 18 , 10 12

Summary of our contribution Failure type Topology estimation Failure localization Exponential No result [HLCWK05] Adversary error Exponential Hardness proof [This work] [This work] Exponential No result Random error [FM05,HLCWK05] Polynomial Polynomial [This work] [This work]

Future direction Current work: From existing good network codes to tomography algorithms. Another direction: From some criteria to new network codes. For instance, network Reed-Solomon code[HS10], satisfies: Optimal multicast throughput Low complexity and distributed designing. Significantly aids tomography: Failure localization without centralized topology information. Adversary localization can be done in polynomial time.

Related works

Network Coding Tomography for Network Failures Thanks! Questions? Details in: Hongyi Yao and Sidharth Jaggi and Minghua Chen, Network Tomography for Network Failures, under submission to IEEE Trans. on Information Theory, and arxiv: 0908-0711 14