Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring

Size: px
Start display at page:

Download "Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring"

Transcription

1 Minimizing Proing Cost and Achieving Identifiaility in Network Link Monitoring Qiang Zheng and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University {quz3, Astract Continuously monitoring the link performance is important to network diagnosis Recently, active proes sent etween end systems are widely used to monitor the link performance In this paper, we address the prolem of minimizing the proing cost and achieving identifiaility in link monitoring Given a set of links to monitor, our ojective is to select as few proing paths as possile to cover all of them, and the selected proing paths can uniquely identify all identifiale links eing monitored We propose an algorithm ased on the linear system model to find out all sets of proing paths that can uniquely identify an identifiale link We etend the ipartite model to reflect the relation etween a set of proing paths and the link that can e uniquely identified Through the etended ipartite model, our optimization prolem is transformed into the classic set cover prolem, which is NP-hard Therefore, we propose a heuristic ased algorithm to greedily select the proing paths Our method eliminates two types of redundant proing paths, ie, those that can e replaced y others and those that cannot e used to achieving identifiaility Simulations ased on real network topologies show that our approach can achieve identifiaility with very low proing cost Compared with prior work, our method is more general and has etter performance Introduction With the rapid growth of the Internet, efficiently monitoring the performance and roustness of the network ecomes more and more important The service providers need to keep tracking of their networks to ensure that their services satisfy the commitments specified in the service level agreements (SLAs) Additionally, applications sensitive to network performance such as online trading, Voice over IP and IPTV, need to know the network status such as link delay, jitter, and loss rate These demands motivate recent research on network monitoring and performance inference Due to various advantages, tomography-ased end-to-end active proe (end-to-end proe for short) has received much attention and has een widely used in network monitoring, such as [] [7] Compared with reply-ased proe such as ping and traceroute, end-to-end proe does not have the prolem of eing ignored y the intermediate routers [8] This work was supported in part y DoD/DTRA under grant DTRA-3- D-- and eing locked y the firewall [9] Furthermore, different from Simple Network Management Protocol (SNMP)-ased polling [], end-to-end proe ased approaches do not need to run agents on routers One of the major considerations in designing a proing scheme is the proing cost, which can e the numer of selected proing paths [], [] [4], the numer of end systems used to send and receive proing packets [7], [], [], and the cost specified y the network component [6] Lower proing cost means less negative effects on the normal data transmission and etter scalaility Therefore, many eisting works [], [6], [7], [] [3] focus on minimizing the proing cost for network monitoring This is usually achieved y carefully selecting the proing paths However, to monitor the performance of a link such as delay and loss rate, selecting proing paths to cover the link may not e sufficient An end-to-end proe measures the performance of the whole proing path, which may consist of multiple links In order to uniquely infer the performance of each link, multiple coordinated proes are needed Unfortunately, in a general network the performance of some links may not e ale to e uniquely inferred from end-to-end proes [] There are two kinds of network links If the performance of a link can e uniquely inferred from a set of end-to-end proes, it is called uniquely identifiale or identifiale for short; otherwise, it is called unidentifiale If the proing paths are not properly selected, the performance of a link cannot e inferred even if it is an identifiale link For eample, as shown in Fig, links e, e, and e 3 are identifiale, ut links e 4 and e are unidentifiale ecause every proing path traversing e 4 also traverses e Selecting the path p (s, s ), p (s, s 3 ), and p 4 (s, s 3 ) can uniquely infer the performance of links e, e, and e 3 However, only choosing p (s, s ) and p (s, s 3 ) cannot uniquely infer the performance of any link In this paper, we aim at minimizing the proing cost and achieving identifiaility in link monitoring More specifically, given a set of links called target links to monitor, our ojective is to select as few proing paths as possile that can cover all the target links and uniquely infer the performance of the identifiale target links under monitoring There are three challenges to achieve our ojective Target links can e links at critical topological location, and their performance usually affects a large area of the network [6]

2 s e s s 3 e s e 4 4 e e 3 Figure An eample of network link monitoring with si proing paths p (s, s ), p (s, s 3 ), p 3 (s, s 4 ), p 4 (s, s 3 ), p (s, s 4 ), and p 6 (s 3, s 4 ), where p i (s j, s k ) denotes the proing path p i etween the end system s j and s k First, a target link may e unidentifiale Using multiple proing paths to monitor an unidentifiale link only wastes andwidth Therefore, it is necessary to differentiate an identifiale link from an unidentifiale one For an unidentifiale target link, we only need to select a proing path traversing it Second, different proing paths have different contriutions to achieving identifiaility, and we need to determine the most useful proing paths Third, a proing path may e ale to e replaced y other proing paths, and we should avoid selecting redundant proing paths The asic idea of our approach is to select proing paths that are the most useful for covering the target links and achieving identifiaility We adopt a linear system to model the relation etween proing paths and links We design a method ased on the matri decomposition and linear replacement to find out irreducile sets of proing paths that can uniquely determine each identifiale target link Moreover, we etend the ipartite model which is commonly used for modeling the relation etween a single proing path and link to reflect the relation etween a set of proing paths and a link Through the ipartite model, our optimization prolem is transformed into the classic set cover prolem, which is NP-hard Therefore, we propose a heuristic ased algorithm to greedily select the proing paths The rest of this paper is organized as follows We present the linear system model and the prolem description in Section Our path selection approach is introduced in Section 3, which includes the algorithm for calculating all solutions to an identifiale link, the etended ipartite model, and the heuristic ased algorithm for selecting proing paths Section 4 presents the performance evaluation of our path selection approach, and Section reviews related work Finally, Section 6 concludes the paper Preliminaries In this section, we first introduce the network model and define our prolem, and then descrie the linear system model used in our approach Prolem Description Similar to prior work on network monitoring [], [], [7] [], we model the network as a connected undirected graph G(V, E) for simplicity, where V is the set of nodes (ie routers) and E = {e i i m} is the set of edges (ie communication links etween routers) Note that the proposed technique also works for asymmetric links In the rest of the paper, we use edge and link interchangealy There are many end systems connecting to the network, and each of them can send and receive proing packets The proing packet from one end system to another traverses the routing path etween them We call such an end-to-end path a proing path If a proing path traverses a link, the path can cover the link In the network, there are n proing paths P = {p i i n} which can e used for monitoring a set of m t target links E t E For simplicity, we assume E t = {e i i m t }, which equals to relaeling the links in G With the router-level topology G, we know which links can e covered y a proing path Generally speaking, network monitoring y means of endto-end proe includes two steps The first step is to select a set of proing paths Then, end systems on the chosen proing paths issue proing packets and send the result to the central Network Operations Center (NOC) In this study, we focus on the first step; ie, selecting proing paths We define the prolem of minimizing the proing cost and achieving identifiaility as follows, where the cost is defined as the numer of proing paths selected for monitoring Definition (Prolem definition): Given a network G, a set of proing paths P, and a set of target links E t, the ojective is to select as few proing paths as possile from P, such that all links in E t are covered and the performance of each identifiale link in E t can e uniquely inferred Linear System Model For the link performance satisfying the additive metric, eg delay, the relation etween the proing paths and links can e naturally modeled as a linear system LS = {ls i i n}, in which ls i is the ith linear equation m j= a ij j = i The variale j denotes the performance of the link e j and the variale i is the performance of the proing path p i The value of a ij is if the proing path p i traverses the link e j ; otherwise it is The linear equation ls i means that the performance of p i is an addition of the performance of all links on p i The linear system LS can also e written as Eq (), where A = (a,, a n ) T is the coefficient matri which is also called the dependency matri [] A = () Take the eample in Fig for instance, the linear system has si equations and five variales,, as shown in Fig (a) The dependency matri is shown in Fig () We use delay as an eample to eplain the meaning of the linear

3 3 3 3 (a) The linear system model LS A () The dependency matri Figure The linear system model and the dependency matri of the eample in Fig equation For the proing path p etween the end system s and s, the overall delay of the path is the sum of the delay on link e and e Correspondingly, in the first equation of the linear system in Fig (a), the variale is equal to the sum of and As mentioned in Section, a link can e either identifiale or unidentifiale, and a proing path may e replaced y other proing paths A link e i is identifiale if and only if the variale i in the linear system is solvale If a row vector a j of the dependency matri A can e linearly epressed y some other row vectors, the proing path p j can e replaced y the proing paths corresponding to the row vectors that linearly epress a j In Fig (), since the row vector a can e linearly epressed as a = a + a 3 + a 4, the proing path p, p 3, and p 4 together can replace the proing path p Due to the linear dependence among row vectors, there may e several linear equations to solve a solvale variale i ; ie, there are multiple sets of proing paths to uniquely determine an identifiale link For an identifiale link e i, we define its solution as follows Definition (Solution to an identifiale link): A solution to an identifiale link e i is a set of proing paths satisfying: () they can uniquely determine e i, and () each proing path in the set cannot e replaced y other proing paths in the set With this definition, each proing path in a solution cannot e replaced y other proing paths in the same solution This is consistent with our ojective of minimizing the overall selected proing paths Consider a set of proing paths that are ale to uniquely determine e i, if a proing path can e replaced y others in the set, after removing this proing path the set can still uniquely determine e i Hence, for determining e i, containing such replaceale proing paths only increases the proing cost Thus, a solution to an identifiale link e i should not contain any replaceale proing path This is the asis of our path selection algorithm The solution to a solvale variale i in the linear system does not necessarily match a solution to e i A solution to i is a linear epression n j= c ij j The variale in this linear epression may e replaced y other variales in the same epression Actually, a solution to e i corresponds to the solution to i satisfying that every variale j in it is Tale Tale of notations Symols Meaning G network under study m numer of links in G e i the ith link in G n numer of proing paths in G p i the ith proing path in G E t set of target links m t numer of target links LS linear system model of G ls i the ith linear equation of LS i measured performance of the ith proing path A dependency matri S i set of all solutions to the variale i in LS Sj i the jth solution to the variale i in LS L set of linear epressions, L = {l i i t} l i the linear epression for the ith row vector in A N not replaceale y other variales in the same solution In the rest of the paper, when we say a solution to a solvale variale i, it means a solution whose variales are not replaceale y other variales in it Since a j = j, a variale j is replaceale y other i s if and only if a j can e linearly epressed y the row vectors corresponding to these i s For eample, a solution to the solvale variale in Fig (a) is + 4 It contains three variales,, and 4 Each of them is not replaceale y other two variales, ecause the corresponding row vectors a, a, and a 4 are linearly independent Accordingly, the proing path p, p, and p 4 together can uniquely determine the identifiale link e, and each of the three proing paths cannot e replaced y another two proing paths Therefore, the set of the proing paths {p, p, p 4 } is a solution to e Tale summarizes the symols used in the linear system model and the symols that will e used in the path selection algorithm in the net section 3 Path Selection Algorithm A solution to an identifiale link is a set of proing paths that can uniquely determine this link Since a proing path may e replaceale y others, an identifiale link may have multiple solutions and a proing path may e useful for uniquely determining multiple identifiale links Consequently, different proing paths have different contriutions to determining the identifiale links In this section, we propose an algorithm to calculate all solutions to each identifiale target link Among these solutions, we determine the contriution of each proing path to achieving identifiaility and then choose the most useful proing paths 3 Decomposition of Linear System The simplest way to determine if a link is identifiale or not is to solve the linear system LS Many techniques in the linear algera, such as Gaussian elimination, can achieve this The linear dependence in row vectors of the dependency matri only affects how many solutions an identifiale link has, ut does not affect whether a link is identifiale or not

4 Therefore, the first step for calculating all solutions to each identifiale target link is to decompose the linear system so as to determine whether a target link is identifiale and produce a solution to each of identifiale target links We divide the row vectors of the dependency matri into two groups As a result, the dependency matri A is decomposed into the form shown as Eq () In this decomposition, the matri A R contains r linearly independent row vectors of A, and A N contains other n r row vectors Each row vector of A N can e linearly epressed y the row vectors of A R For simplicity, we renumer the proing paths such that A R = (a,, a r ) T and A N = (a r+,, a n ) T ( ) AR A = () A N Accordingly, the linear system LS can e epressed as Eq (3), in which the vector is partitioned into two vectors R = (,, r ) T and N = ( r+,, n ) T Since each row vector of A N is a linear comination of row vectors of A R, a solvale/unsovlale variale in the linear system A R = R is also solvale/unsolvale in the linear system in Eq () ( ) ( ) AR R = (3) A N N To construct the decomposition of the matri A, we use the algorithm introduced in [3], which is ased on standard rank-revealing decomposition techniques [] It is possile that a dependency matri has multiple decompositions of Eq () In the net part, we will see that our algorithm for calculating all solutions to an identifiale target link does not have any requirement on the decomposition of the linear system Therefore, we can use any tie reaking strategy to choose a decomposition By solving the linear system A R = R, we can determine whether a target link is identifiale or not and calculate a solution S i to the solvale variale i The solution calculated from the linear system A R = R is referred to as the ase solution There is only one ase solution to each solvale variale i ecause the row vectors of A R are linearly independent Since the row vector of A N can e linearly epressed y the row vectors of A R, we calculate the linear epression for each row vector of A R as shown in Eq (4), where i =,, n r r c ij a j + a r+i = (4) j= Multiplying vector to oth sides of Eq (4) results in r j= c ija j + a r+i = Since a i = i eists for i n, we can get the linear epression in Eq () We use L = {l i i n r} to denote the set of these linear epressions, in which l i is the epression containing r+i r c ij j + r+i = () j= Take the eample in Fig () for instance, a decomposition of the matri A is A R = (a, a, a 3, a 4 ) T and A N = (a, a 6 ) T The corresponding partition of is R = (,, 3, 4 ) T and N = (, 6 ) T By solving the linear system A R = R, we discover that e, e, and e 3 are identifiale ut e 4 and e are unidentifiale The ase solution to is = + 4 It corresponds to a solution to e, ie the set {p, p, p 4 } The set L contains two linear epressions, in which l is = and l is = 3 Calculation of Solutions By decomposing the linear system LS, we find out all identifiale target links, otain the ase solution to each solvale variale, and calculate the linear epression for r+,, n In this susection, we propose an algorithm to calculate all solutions to a solvale variale, through which we can otain all solutions to the corresponding identifiale link The asic idea of calculating all solutions to a solvale variale i is to replace the variales in the solutions with the linear epression in the set L Initially, we have only the ase solution S i otained from the linear system A R = R For each linear epression l j L, if it has a common variale k with S, i replacing k in S i with l j results in a linear epression that can solve i Then we check if this linear epression has any variale that can e replaced y other variale in it If not, this linear epression is a solution to i We apply similar linear replacements to all solutions until no new solution can e produced Later we will see that this algorithm can find all solutions to a solvale variale i The algorithm for calculating all solutions to a solvale variale i is shown in Algorithm The input is the ase solution S i otained from A R = R and the set L of the linear epressions We use a queue to store the solutions As shown in line 4, each time we take out a solution from the queue and apply all possile linear replacements to it The linear replacement generates a linear epression St i (line 8) Then, in line 9, the algorithm checks if each variale in St i is replaceale y other variales in St i If St i does not have any replaceale variale, it is a solution to i For a solution not in Q and S i, it is a new solution Thus we put it into the queue After applying all linear replacements to the current solution Sc, i we put it into the solution set S i As a result, at any moment the set S i contains all solutions that have een applied linear replacements, and the queue Q contains all solutions that will e applied linear replacements When the queue Q ecomes empty, the algorithm stops and all solutions to i are in the set S i Theorem : The algorithm SolutionCalculation can find out all solutions to a solvale variale in the linear system Proof: Suppose there is a solution Sq i to the solvale variale i that is not found out y the algorithm This

5 Algorithm SolutionCalculation Input: The ase solution S i, and the set of the linear epressions L Output: A set S i containing all solutions to i Procedure: : INIT(Q) //Initialize a queue Q : S i = 3: ENQUEUE(Q, S i ) 4: while Q do : Sc i = DEQUEUE(Q) 6: for each linear epression l j L do 7: for each k in oth Sc i and l j do 8: St i replace k in Sc i with l j 9: if each variale in St i cannot e replaced y other variales in St i, and Si t / Q Si t / Si then : ENQUEUE(Q, St i) : end if : end for 3: end for 4: S i = S i Sc i : end while solution has the following form n i = d qj j (6) j= From the algorithm SolutionCalculation we can see that all solutions in S i is a linear cominations of S i and the linear epressions in L Therefore, this missed solution Sq i cannot e linearly epressed y S i and linear epressions in L Consider the linear system in Eq (7) that includes S, i Sq, i and all linear epressions in L r j= d j j i = n j= d qj j i = r j= c j j + r+ = (7) r j= c n r,j j + n = The coefficient matri of this linear system is as Eq (8) r r+ n i d d r d q d qr d q,r+ d qn c c r (8) c n r, c n r,r By sutracting d q,r+k times the ( + k)th row from the second row (k =,, n r), the matri turns into the form as in Eq (9), where d qj = d qj n r k= d q,r+kc kj for j =,, r r r+ n i d d r d q d qr c c r c n r, c n r,r (9) Since Sq i cannot e linearly epressed y S i and linear epressions in L, the first two row vectors in Eq (9) are linearly independent It means that d j d qj for j =,, r Therefore, there are two solutions to i in the linear system A R = R, ie r j= d j j and r j= d qj j It contradicts with the fact that A R = R has only one solution to each solvale variale as mentioned efore Therefore, no such S i q eists In conclusion, SolutionCalculation can find out all solutions to the solvale variale i As mentioned in Section, each solution to a solvale variale i corresponds to a solution to the identifiale link e i For each variale j contained in a solution to i, the corresponding solution to e i contains the proing path p j Therefore, after calculating all solutions to i, we can easily otain all solutions to e i To make it more clear, we use an eample to show how to calculate all solutions to the identifiale link e in Fig Initially, we have a solution S that is + 4 The linear epression set L contains two equations l : = and l : = The solution S has two common variales and 4 with the linear epression l Replacing in S with results in +3, which is a new solution We name it as S Similarly, replacing 4 in S with 3 + produces +3 Then we use l to replace and 4 in S, oth resulting in +3 6 named as S3 Until now, we have already applied all possile linear replacement to S Net, we apply linear replacements toward S and S3 The generated new solutions are put into the queue and the linear replacement continues until the queue is empty When applying l to the solution 4 +6 to replace 4, we get a linear epression Since the corresponding row vectors {a, a, a 3, a, a 6 } are not linearly independent, we do not take it as a solution to i The algorithm stops after finding out si solutions , 4 + 6, +3, +3 6,, and 4+ 6 Accordingly, there are si solutions to the link e : {p, p, p 4 }, {p, p 3, p }, {p, p 3, p 6 }, {p 3, p 4, p, p 6 }, {p, p 4, p, p 6 }, and {p, p 4, p, p 6 } 33 Etended Bipartite Model As in the literature [], the relation etween the proing paths and the target links is usually modeled as a ipartite graph G B = (U, V, E), where U and V are two sets of vertices and E is a set of edges A verte in the set U and V denotes a proing path and a target link, respectively If a proing path p i traverses a target link e j, there is an edge etween the verte u i U and v j V Thus the edge reflects the coverage relation etween the proing path and the target link However, this ipartite model cannot deal with our path selection prolem, ecause it is unale to reflect the relation etween an identifiale target link and its solutions Therefore, we propose an etended ipartite model In our ipartite

6 model G B = (U, V, E), the verte set U has two suset U and U, and the verte set V also has two susets V and V, shown in Fig 3 A verte in the set V and V represents an identifiale and unidentifiale target link, respectively Each verte in U denotes a solution to an identifiale target link Hence it corresponds to a set of proing paths It is possile that a proing path is not in any solution We use a verte in U to denote each of such proing paths There are three kinds of edges in the etended ipartite mode as follows V V U U Figure 3 An illustration of the etended ipartite model ) The edge etween V and U For an identifiale target link denoted y the verte vi V, if the solution represented y the verte u j U is a solution to this identifiale link, there is an edge connecting verte vi and u j Hence the edge reflects the identifiaility relation etween a solution and an identifiale target link ) The edge etween V and U For an unidentifiale target link represented y verte vi V, if a proing path in the solution represented y verte u j U covers it, there is an edge etween vi and u j The edge reflects the coverage relation etween a solution and an unidentifiale target link 3) The edge etween V and U For an unidentifiale target link represented y the verte vi V, if a proing path represented y the verte u j U traverses it, there is an edge connecting vi and u j The edge reflects the coverage relation etween a single proing path and an unidentifiale target link There is no edge etween set V and U For identifiale target links, we need to select proing paths to uniquely determine them, which equals to the prolem of choosing vertices from U such that their neighors include all vertices in V The edges etween V and U are sufficient to model the prolem Thus, we do not add any edge etween an identifiale target link and a single proing path The commonly used ipartite model G B is a special case of our ipartite model If we do not consider the identifiaility, we can intentionally mark all target links as unidentifiale to make the set V empty Accordingly, the set U ecomes empty ecause there is no solution Hence the etended ipartite model turns into the commonly used ipartite model We can construct the ipartite graph G B in the following three steps First, we uild sets V, V, and U, and let U e empty Then we construct the edges etween U and V, and the edges etween U and V Finally, for each proing path that is not in the set U, we add a verte to U to denote it and construct the edges etween it and the verte in V numnewv ertices numnewp aths 34 Path Selection Algorithm Through the etended ipartite model, our path selection prolem equals to selecting a set of vertices from U U, so that all vertices in V V are their neighors This prolem is NP-hard, ecause it can e easily transformed into the set cover prolem Thus we design a heuristic ased algorithm to solve it The asic idea of the path selection algorithm is to greedily select proing paths until all identifiale target links can e uniquely determined and all unidentifiale target links are covered For each identifiale target link, we select a set of proing paths ased on its solutions Currently, we give the identifiale target link a priority higher than the unidentifiale target link, ecause uniquely determining an identifiale link is more comple and needs more proing paths than covering an unidentifiale link Hence, the algorithm first deals with the identifiale target link and then the unidentifiale target link An important point is that the selected proing paths may contain replaceale proing paths Therefore, after finishing the path selection, the algorithm removes all replaceale ones from the selected proing paths The linear system ased method for finding out all replaceale proing paths is introduced in Section For a large scale network, there can e thousands of proing paths Accordingly, an identifiale target link may have a large numer of solutions In order to enhance the scalaility of our method, we introduce a parameter α to control how many solutions to an identifiale target link are used in path selection The path selection algorithm is shown as Algorithm It takes the linear system LS and the parameter α as input, and returns a set of proing paths that can uniquely determine all identifiale target links and cover all unidentifiale target links Firstly, the algorithm calculates solutions to each identifiale target link with the algorithm SolutionCalculation, and then select α solutions for each identifiale target link Net, the algorithm uilds the etended ipartite graph G B = (U, V, E) ased on the linear system LS and selected solutions After uilding the etended ipartite graph, the algorithm starts to use a heuristic to select proing paths From line 8 to 6, the algorithm greedily selects vertices from U until all vertices in V are covered Each time, the algorithm chooses an uncovered verte with the maimal value of Intuitively, it means that we like to add as few proing paths as possile and uniquely determine as many identifiale target links as possile When all identifiale target links are handled, the unselected proing paths are contained in

7 oth U and U Thus the algorithm selects vertices from U U for the uncovered unidentifiale target links until all of them are covered Finally, the algorithm removes all replaceale proing paths from the set Algorithm PathSelection Input: The linear system LS and the parameter α Output: A set of proing paths P s Procedure: : for each identifiale target link do : calculate solutions to it y means of the algorithm SolutionCalculation, and then select α solutions 3: end for 4: Construct the etended ipartite graph G B = (U, V, E) with the selected solutions : P s = 6: Mark all vertices in V, V, U, and U as uncovered 7: Mark all proing paths as unused 8: while V has uncovered vertices do 9: Select an uncovered verte u m from U with the largest numnewv ertices, where numnewv ertices is the numer of numnewp aths uncovered verte in V connected to u m, and numnewp aths is the numer of unused proing path contained in u m If there are multiple candidates, select the one that connects to the maimal uncovered vertices in V : : Mark u m as covered Mark all uncovered vertices in V V connected to u m as covered : for each unused proing path p i in u m do 3: P s = P s p i 4: Mark p i as used : end for 6: end while 7: while V has uncovered vertices do 8: Select an uncovered verte u m from U U that has the largest numnewv ertices, where numnewv ertices is the numer of numnewp aths uncovered verte in V connected to u m, and numnewp aths is the numer of unused proing path contained in u m 9: : Mark u m as covered Mark all uncovered vertices in V connected to u m as covered : for each unused proing path p j in u m do : P s = P s p j 3: Mark p j as used 4: end for : end while 6: Remove all replaceale proing paths from the set P s Theorem : The upper ound of the numer of proing paths selected y the algorithm PathSelection is the row rank of the dependency matri Proof: Consider the set P s efore removing the replaceale paths in it, we have P s P For the linear system LS s formed y the proing paths in P s, the row rank of the coefficient matri A s is no larger than that of the dependency matri A in Eq () After removing all replaceale proing paths, the numer of proing paths in P s is equal to the row rank of A s, which is unchanged after removing replaceale paths Therefore, the numer of proing paths returned y the algorithm is no larger than the row rank of the dependency matri Finally, we use an eample to show the algorithm for selecting proing paths for the target link e and e 4 in Fig In the eample, we use all solutions for path selection The corresponding ipartite model is shown in Fig 4 The set U has si vertices, each of which represents a solution to the identifiale link e The set U is empty, ecause all proing paths traversing the unidentifiale link e 4 are in the set U The verte e 4 in V has no edge to the verte {p, p, p 4 } in U ecause these three paths do not traverse e 4 The algorithm first chooses a path set for e Among all si vertices in U, the verte {p, p, p 4 }, {p, p 3, p }, numnewv ertices and {p, p 3, p 6 } have the same value of numnewp aths Since {p, p 3, p } and {p, p 3, p 6 } can also cover an unidentifiale link, the algorithm selects a path set from them, eg {p, p 3, p } After choosing it, all vertices in V V are marked as covered Since the selected set does not contain any replaceale proing path, the algorithm stops and returns a set of proing paths {p, p 3, p } V e V p p, p, p 4 p, p 3, p p, p 3, p, p 4, p, p, p 4, p, p 3, p 4, p, 6 p 6 p 6 p 6 U Figure 4 The etended ipartite model for selecting proing paths for the target link e and e 4 in Fig 4 Performance Evaluations In this section, we evaluate the performance of our algorithm that can select a minimal set of proing paths to cover a set of target links and uniquely determine all identifiale target links We compare the performance of our method with others [3], and study how network topologies and the percentages of target links affect the performance 4 Simulation Setup The simulation is ased on eight ISP topologies derived y the Rocketfuel project [] Tale summarizes these topologies The first column shows the total numer of nodes and the second column shows the numer of leaf nodes for each topology Similar to [4], we connect end systems to the leaf nodes to send and receive proing packets All topologies adopt the shortest path routing calculated ased on the link cost in the topologies Since the link is symmetrical in these topologies, the routing path etween two nodes is symmetrical Thus the numer of proing paths is n l(n l ), where n l is the numer of leaf nodes Due to shortest path routing, each topology has some links that cannot e covered y the proing paths We list the numer of links that can e covered y proing paths in the fourth column Among these links, some can e uniquely determined y proing paths The last column shows the numer of identifiale links and the percentage of links covered y the proing paths In si topologies, more than e 4

8 Tale Summary of Topologies Used in Simulation Topology Total Leaf Total Covered Identifiale Nodes Nodes Links Links Links (%) AS (667%) AS (63%) AS (84%) AS (379%) AS (679%) AS (6%) AS (8%) AS (47%) half of the links covered y proing paths are identifiale In topology AS7, it is as high as 84% For each topology, we randomly select a certain percent of the link that can e covered y proing paths as the target link The percentage of the target link ranges from % to % We run each simulation for times and take the statistical average as the result For each test case, we run the algorithm PathSelection with α =,,,, In our path selection algorithm, we do not specify how to select α solutions, thus we randomly select solutions in the evaluation Different strategies for selecting solutions to uild etended ipartite graph are left for future work The major performance metric in our evaluation is the numer of the selected proing paths, which is referred to as the overall proing cost We also use two other metrics to show the amortized proing cost ) Cost per target link: It is the ratio of the overall proing cost to the numer of target links This metric quantifies the amortized cost on each target link ) Overhead per identifiale target link: The algorithm introduced in [] can select a minimal set of proing paths to cover all target links The difference etween the overall proing cost and the numer of proing paths for covering all target links can e considered as additional proing paths used for achieving identifiaility The overhead per identifiale target link is the ratio of such additional cost to the numer of identifiale target links 4 Overall Proing Cost The overall proing cost of our path selection algorithm on eight topologies is shown in Fig On all these topologies, the overall proing cost of the algorithm with α = is almost the same as that of the algorithm with α = under each percentage of target links Hence, in Fig we omit the case of α = From the figure we can see that increasing α, namely using more solutions for path selection, can reduce the overall proing cost As the percentage of target links increases, more and more non-redundant proing paths are selected Accordingly, the overall proing cost gradually converges to the theoretical upper ound shown in Theorem Therefore, when the percentage of target links reaches %, the overall proing cost under different α ecomes similar 43 Amortized Proing Cost In this part, we show the amortized proing cost of the path selection algorithm with α = As shown in Fig 6, the proing cost per target link decreases as the percentage of target links increases The overhead per identifiale target link shown in Fig 7 has similar trend When the percentage of target links increases, the amortized overhead decreases For oth of them, when the percentage of target links reaches %, the amortized cost reduces to aout /3 of the case when % links are target links This indicates that our path selection algorithm can effectively choose the proing paths that are most useful for identifying multiple target links and eliminate redundant proing paths Cost per target link AS AS9 AS7 AS99 Cost per target link AS668 AS48 AS88 AS94 (a) AS, AS9, AS7, AS99 () AS668, AS48, AS88, AS94 Figure 6 The cost per target link of the path selection algorithm with α = Overhead per identifiale target link AS AS9 AS7 AS99 Overhead per identifiale target link AS668 AS48 AS88 AS94 (a) AS, AS9, AS7, AS99 () AS668, AS48, AS88, AS94 Figure 7 The overhead per identifiale target link of the path selection algorithm with α = 44 Comparisons The closest work in this area is the SelectPath algorithm [3], which can select a minimal set of proing paths to uniquely determine all identifiale links in the network However, the SelectPath algorithm is only a special case of what our algorithm can do, ie when all links are target links Even for this special case, we show that the performance of our solution is guaranteed to e etter or equal to theirs in this susection

9 4 3 3 = = = = (a) AS = = = = = = = = () AS = = = = = 4 = 3 = = (c) AS = = 3 = = (d) AS99 (e) AS668 (f) AS48 (g) AS88 (h) AS94 Figure The overall proing cost of the path selection algorithm with α =,,, = = = = = = = = Tale 3 Largest Overall Proing Cost of The PathSelection Algorithm with Different α and Overall Proing Cost of The SelectPath Algorithm Topology α SelectPath [3] AS AS AS AS AS AS AS AS Since the SelectPath algorithm cannot e modified for an aritrary set of target links, we only compare the performance on the case that all links are target links, although this is not fair to our algorithm which is more general As shown in [3], the overall proing cost of the SelectPath algorithm is equal to the row rank of the dependency matri According to Theorem, the row rank of the dependency matri is the upper ound of the overall proing cost of our algorithm As a result, our method is theoretically no worse than the SelectPath algorithm For each topology and α, we choose the largest overall proing cost among simulation runs Tale 3 shows the largest overall proing cost of our algorithm with different α and the overall proing cost of the SelectPath algorithm On five topologies, our algorithm with each α outperforms the SelectPath algorithm On the other three topologies AS, AS7 and AS48, the performance of our algorithm is equal to the SelectPath algorithm The SelectPath algorithm selects the proing paths corresponding to the asis of row vectors of the dependency matri Although the vectors in the asis are linearly independent, it does not mean there is no redundance Fig () is a simple eample to eplain this fact There are three identifiale links e, e, and e 3 The asis of the row vectors contains 4 linearly independent vectors However, only three proing paths p, p, and p 4 are adequate to uniquely determining these three identifiale links Adding any other proing paths does not contriute to achieving identifiaility, no matter it is replaceale y p, p, and p 4 or not Our algorithm outperforms the SelectPath algorithm ecause we try to avoid not only the replaceale proing path ut also the proing path without any contriution to achieving identifiaility Related Work Minimizing the proing cost is usually achieved y carefully selecting proing paths This prolem has een studied without resource limitation [], [3], [4], and in scenarios with eplicit operational requirement [7] and resource constraint [3] Various kinds of proing costs and monitoring ojectives have een studied However, As pointed out in [4], many network inference prolems are ill-posed, ecause the numer of measurements are not sufficient to uniquely determine the result Our work jointly addresses minimizing the proing cost and achieving identifiaility Achieving identifiaility in network link monitoring is also considered in [3], [] [3] However, our work is quite different from them Zhao et al [3] proposed a method for determining the shortest sequence of links whose properties can e uniquely identified y end-to-end proes It is similar to differentiating the identifiale from unidentifiale links in our work However, their method does not consider how

10 to minimize the proing cost The failure localization in [] aims at accurately pinpointing a failed link, which in essence is to achieve identifiaility However, it only focuses on locating a single link Our method is ale to uniquely determine every identifiale link Both [] and [3] deal with the prolem of selecting a minimal set of proing paths that can uniquely determine all identifiale links in the network It is only a special case of what our algorithm can address, ie when all links are target links Even for this special case, the performance of our solution is guaranteed to e etter or equal to theirs Another major difference is the method we adopt Their methods are ased on eliminating the replaceale path; ie, the linearly dependent row vector in the dependency matri We take a different approach, and only select the proing paths that are the most useful to our ojective Besides eliminating the replaceale proing path, we also try to avoid selecting the proing path without any contriution to achieving identifiaility 6 Conclusions and Future Work The end-to-end proe has received considerale attention in network link monitoring In this paper, we propose an approach to minimize the proing cost and achieve identifiaility The asic idea is to select proing paths that are the most useful for covering the target links and achieving identifiaility Furthermore, our method eliminates two types of redundant proing paths, ie, those that can e replaced y others and those without any contriution to achieving identifiaility With our approach, the numer of selected proing paths is proved to e ounded Eperiments ased on eight ISP topologies demonstrate that our approach can achieve identifiaility with a minimal set of proing paths Compared with prior works, our method is more general and has etter performance The algorithm proposed for calculating all solutions to an identifiale link may generate a large numer of path sets when the network scale is large It is possile that using only a small portion of the calculated path sets can produce good enough results As future work, we will investigate possile solutions that can effectively pick the proing paths most useful in reducing the overall proing cost Also, we will study other heuristics for path selection, and evaluate our approaches using different kind of proing cost References [] R R Kompellay, J Yatesz, A Greenergz, and A C Snoeren, IP fault localization via risk modeling, in USENIX NSDI,, pp 7 7 [] F Li and M Thottan, End-to-end service quality measurement using source-routed proes, in IEEE Infocom, 6, pp [3] Y Zhao, Y Chen, and D Bindel, Towards uniased endto-end network diagnosis, in ACM SIGCOMM, 6, pp 9 3 [4] A Dhamdhere, R Teieira, C Dovrolis, and C Diot, NetDiagnoser: trouleshooting network unreachailities using endto-end proes and routing data, in ACM CoNEXT, 7 [] R R Kompella, J Yates, and A G A C Snoeren, Detection and localization of network lack holes, in IEEE Infocom, 7, pp 8 88 [6] P P C Lee, V Misra, and D Ruenstein, Toward optimal network fault correction via end-to-end inference, in IEEE Infocom, 7, pp [7] Y Zhao, Z Zhu, Y Chen, D Pei, and J Wang, Towards efficient large-scale VPN monitoring and diagnosis under operational constraints, in IEEE Infocom, 9 [8] M H Gunes and K Sarac, Analyzing router responsiveness to active measurement proes, in Passive and Active Measurement Conference, 9, pp 3 3 [9] R Sherwood and N Spring, Touring the Internet in a TCP sidecar, in ACM SIGCOMM Conference on Internet Measurement, 6, pp [] W Stallings, SNMP, SNMPv, SNMPv3, and RMON and (3rd Edition) Addison-Wesley Longman Pulishing Co, Inc, 998 [] Y Bejerano and R Rastogi, Roust monitoring of link delays and faults in IP networks, in IEEE Infocom, 3, pp [] H X Nguyen and P Thiran, Active measurement for multiple link failures diagnosis in IP networks, in Passive and Active Measurement Conference, 4, pp 8 94 [3] Y Chen, D Bindel, H Song, and R H Katz, An algeraic approach to practical and scalale overlay network monitoring, in ACM SIGCOMM, 4, pp 66 [4] P Barford, N Duffield, A Ron, and J Sommers, Network performance anomaly detection and localization, in IEEE Infocom, 9 [] T Bu, N Duffield, F L Presti, and D Towsley, Network tomography on general topologies, in ACM SIGMETRICS,, pp 3 [6] J Wu, Y Zhang, Z M Mao, and K G Shin, Internet routing resilience to failures analysis and implications, in ACM CoNEXT, 7, pp [7] Y Breitart, C-Y Chan, M Garofalakis, R Rastogi, and A Silerschatz, Efficiently monitoring andwidth and latency in IP networks, in IEEE Infocom,, pp [8] L Li, M Thottan, B Yao, and S Paul, Distriuted network monitoring with ounded link utilization in IP networks, in IEEE Infocom, 3, pp [9] M Thottan, L E Li, B Yao, V S Mirrokni, and S Paul, Distriuted network monitoring for evolving IP networks, in IEEE ICDCS, 4, pp 7 79 [] K Suh, Y Guo, J Kurose, and D Towsley, Locating network monitors: compleity, heuristics, and coverage, in IEEE Infocom,, pp 3 36 [] G H Golu and C F V Loan, Matri Computations (3rd Edition) Johns Hopkins University Press, 996 [] R Sherwood, A Bender, and N Spring, Measuring ISP topologies with Rocketfuel, in ACM SIGCOMM,, pp [3] H X Nguyen, R Teieira, P Thiran, and C Diot, Minimizing proing cost for detecting interface failures algorithms and scalaility analysis, in IEEE Infocom, 9 [4] H X Nguyen and P Thiran, Network loss inference with second order statistics of end-to-end flows, in ACM SIG- COMM Conference on Internet Measurement, 7, pp 7 4

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering

More information

Detecting Anomalies Using End-to-End Path Measurements

Detecting Anomalies Using End-to-End Path Measurements Detecting Anomalies Using End-to-End Path Measurements K. V. M. Naidu Debmalya Panigrahi Rajeev Rastogi Bell Labs Research India, Bangalore MIT Bell Labs Research India, Bangalore Abstract In this paper,

More information

Binary vs Analogue Path Monitoring in IP Networks

Binary vs Analogue Path Monitoring in IP Networks Binary vs Analogue Path Monitoring in IP Networks Hung X. Nguyen and Patrick Thiran School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland {hung.nguyen, patrick.thiran}@epfl.ch

More information

Effective Network Monitoring

Effective Network Monitoring Effective Network Monitoring Yuri Breitbart, Feodor Dragan, Hassan Gobjuka Department of Computer Science Kent State University Kent, OH 44242 {yuri,dragan,hgobjuka}@cs.kent.edu 1 Abstract Various network

More information

Joint Optimization of Monitor Location and Network Anomaly Detection

Joint Optimization of Monitor Location and Network Anomaly Detection Joint Optimization of Monitor Location and Network Anomaly Detection Emna Salhi, Samer Lahoud, Bernard Cousin ATNET Research Team, IRISA University of Rennes I, France {emna.salhi, samer.lahoud, bernard.cousin}@irisa.fr

More information

Packet Doppler: Network Monitoring using Packet Shift Detection

Packet Doppler: Network Monitoring using Packet Shift Detection Packet Doppler: Network Monitoring using Packet Shift Detection Tongqing Qiu Georgia Inst. of Technology Nan Hua Georgia Inst. of Technology Jian Ni Yale University Richard (Yang) Yang Yale University

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen Northwestern University {yzhao,zzh3,ychen}@cs.northwestern.edu Dan Pei, Jia Wang

More information

Real-time Targeted Influence Maximization for Online Advertisements

Real-time Targeted Influence Maximization for Online Advertisements Real-time Targeted Influence Maximization for Online Advertisements Yuchen Li Dongxiang Zhang ian-lee Tan Department of Computer Science School of Computing, National University of Singapore {liyuchen,zhangdo,tankl}@comp.nus.edu.sg

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

QoS Provisioning in Mobile Internet Environment

QoS Provisioning in Mobile Internet Environment QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse

More information

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Abstract Ricardo Oliveira Mohit Lad Beichuan Zhang rveloso@cs.ucla.edu mohit@cs.ucla.edu bzhang@cs.arizona.edu

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Analytical IP Alias Resolution

Analytical IP Alias Resolution Analytical IP Alias Resolution Mehmet Gunes Department of Computer Science University of Texas at Dallas Richardson, TX 75080, USA Email: mgunes@student.utdallas.edu Kamil Sarac Department of Computer

More information

Link Identifiability in Communication Networks with Two Monitors

Link Identifiability in Communication Networks with Two Monitors Link Identifiability in Communication Networks with Two Monitors Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley Imperial College, London, UK. Email: {l.ma10, kin.leung}@imperial.ac.uk

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin

More information

Discovering High-Impact Routing Events Using Traceroutes

Discovering High-Impact Routing Events Using Traceroutes ISCC 2015 IEEE Symposium on Computers and Communications Discovering High-Impact Routing Events Using Traceroutes Dept. of Engineering, Roma Tre University, Italy July 7th, 2015 Larnaca, Cyprus Joint work

More information

JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657

JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657 JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657 Effective Monitor Placement in Internet Networks Yuri Breitbart Feodor F. Dragan Hassan Gobjuka Department of Computer Science Department of Computer

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Network Monitoring in Multicast Networks Using Network Coding

Network Monitoring in Multicast Networks Using Network Coding Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen

More information

Response time analysis in AFDX networks with sub-virtual links and prioritized switches

Response time analysis in AFDX networks with sub-virtual links and prioritized switches Response time analysis in AFDX networks with su-virtual links and prioritized switches J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

Tomography-based Overlay Network Monitoring

Tomography-based Overlay Network Monitoring Tomography-based Overlay Network Monitoring Yan Chen, David Bindel, Randy H. Katz Computer Science Division University of California at Berkeley Berkeley, CA 947-776, USA {yanchen, dbindel, randy}@cs.berkeley.edu

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Robust Monitoring of Link Delays and Faults in IP Networks

Robust Monitoring of Link Delays and Faults in IP Networks Robust Monitoring of Link Delays and Faults in IP Networks Yigal Bejerano and Rajeev Rastogi Bell Laboratories, Lucent Technologies 600 Mountain Avenue, Murray Hill, NJ 07974 Email: {bej,rastogi}@research.bell-labs.com

More information

A Dynamic Polling Scheme for the Network Monitoring Problem

A Dynamic Polling Scheme for the Network Monitoring Problem A Dynamic Polling Scheme for the Network Monitoring Problem Feng Gao, Jairo Gutierrez* Dept. of Computer Science *Dept. of Management Science and Information Systems University of Auckland, New Zealand

More information

Network Monitoring: It Depends on your Points of View

Network Monitoring: It Depends on your Points of View Network Monitoring: It Depends on your Points of View Christina Fragouli EPFL, Lausanne christina.fragouli@epfl.ch Athina Markopoulou University of California, Irvine athina@uci.edu Ramya Srinivasan EPFL,

More information

Probe Station Placement for Robust Monitoring of Networks

Probe Station Placement for Robust Monitoring of Networks Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: natu@cis.udel.edu Adarshpal S. Sethi

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Actuarial Present Values of Annuities under Stochastic Interest Rate

Actuarial Present Values of Annuities under Stochastic Interest Rate Int. Journal of Math. Analysis, Vol. 7, 03, no. 59, 93-99 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ijma.03.3033 Actuarial Present Values of Annuities under Stochastic Interest Rate Zhao Xia

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Latency Equalization as a New Network Service Primitive Minlan Yu, Student Member, IEEE, Marina Thottan, Member, IEEE, ACM, and Li (Erran) Li, Senior Member, IEEE

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

A Cross-Layer Approach for IP Network Protection

A Cross-Layer Approach for IP Network Protection A Cross-Layer Approach for IP Network Protection Qiang Zheng, Jing Zhao, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz13, juz139, gcao}@cse.psu.edu

More information

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression Opening Example CHAPTER 13 SIMPLE LINEAR REGREION SIMPLE LINEAR REGREION! Simple Regression! Linear Regression Simple Regression Definition A regression model is a mathematical equation that descries the

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Bandwidth Allocation in a Network Virtualization Environment

Bandwidth Allocation in a Network Virtualization Environment Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero jfbotero@entel.upc.edu Xavier Hesselbach xavierh@entel.upc.edu Department of Telematics Technical University of Catalonia

More information

An error recovery transmission mechanism for mobile multimedia

An error recovery transmission mechanism for mobile multimedia An error recovery transmission mechanism for moile multimedia Min Chen *, Ang i School of Computer Science and Technology, Hunan Institute of Technology, Hengyang, China Astract This paper presents a channel

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University

More information

THE last two decades have witnessed an exponential

THE last two decades have witnessed an exponential IEEE JSAC - SAMPLING 2006 1 Practical Beacon Placement for Link Monitoring Using Network Tomography Ritesh Kumar and Jasleen Kaur Abstract Recent interest in using tomography for network monitoring has

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Inference, monitoring and recovery of large scale networks

Inference, monitoring and recovery of large scale networks I N S R Institute for Networking and Security Research CSE Department PennState University Inference, monitoring and recovery of large scale networks Faculty: Thomas La Porta Post-Doc: Simone Silvestri

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons

A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons Data Mining and Knowledge Discovery manuscript No. (will e inserted y the editor) A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons Hsuan-Tien Lin Astract Many

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet 1 Estimation of available bandwidth and measurement infrastructure for Abstracts Russian segment of Internet Platonov A.P. 1), Sidelnikov D.I. 2), Strizhov M.V. 3), Sukhov A.M. 4) 1) Russian Institute

More information

Using Virtual SIP Links to Enable QoS for Signalling

Using Virtual SIP Links to Enable QoS for Signalling Using Virtual SIP Links to Enale QoS for Signalling Alexander A. Kist and Richard J. Harris RMIT University Melourne BOX 2476V, Victoria 31, Australia Telephone: (+) 61 (3) 9925-5218, Fax: (+) 61 (3) 9925-3748

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu

More information

Network Topology and Traceroutes

Network Topology and Traceroutes A Distributed Approach to End-to-End Network Topology Inference Xing Jin Qiuyan Xia S.-H. Gary Chan Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce M. Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. Carnegie Mellon and Akamai Tech.

More information

Finding Ethernet-Type Network Topology is Not Easy

Finding Ethernet-Type Network Topology is Not Easy Finding Ethernet-Type Network Topology is Not Easy Hassan Gobjuka, Yuri Breitbart Department of Computer Science Kent State University Kent, OH 44242 {hgobjuka,yuri}@cs.kent.edu 1 Abstract In this paper

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Codes for Network Switches

Codes for Network Switches Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

DIVIDE AND CONQUER: Partitioning OSPF networks with SDN

DIVIDE AND CONQUER: Partitioning OSPF networks with SDN DIVIDE AND CONQUER: Partitioning OSPF networks with SDN Marcel Caria, Tamal Das, and Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: {m.caria, t.das, a.jukan} @tu-s.de Marco

More information

A Direct Numerical Method for Observability Analysis

A Direct Numerical Method for Observability Analysis IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method

More information

Handout for three day Learning Curve Workshop

Handout for three day Learning Curve Workshop Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, roland.kankey@dau.mil)

More information

Betting on Permutations

Betting on Permutations Betting on Permutations Yiling Chen Yahoo! Research 45 W. 18th St. 6th Floor New York, NY 10011 Evdokia Nikolova CS & AI Laoratory Massachusetts Institute of Technology Camridge, MA 02139 Lance Fortnow

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

Network-Wide Prediction of BGP Routes

Network-Wide Prediction of BGP Routes Network-Wide Prediction of BGP Routes Nick Feamster Jennifer Rexford Georgia Tech Princeton University feamster@cc.gatech.edu jrex@cs.princeton.edu Abstract This paper presents provably correct algorithms

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE

More information

Towards Unbiased End-to-End Network Diagnosis

Towards Unbiased End-to-End Network Diagnosis Towards Unbiased End-to-End Network Diagnosis Yao Zhao, Yan Chen Northwestern University {yzhao, ychen}@cs.northwestern.edu David Bindel University of California at Berkeley dbindel@eecs.berkeley.edu ABSTRACT

More information

An iterative tomogravity algorithm for the estimation of network traffic

An iterative tomogravity algorithm for the estimation of network traffic IMS Lecture Notes Monograph Series Complex Datasets and Inverse Problems: Tomography, Networks and Beyond Vol. 54 (2007) 12 23 c Institute of Mathematical Statistics, 2007 DOI: 10.1214/074921707000000030

More information

Traffic Engineering in SDN/OSPF Hybrid Network

Traffic Engineering in SDN/OSPF Hybrid Network 2014 IEEE 22nd International Conference on Network Protocols Traffic Engineering in SDN/OSPF Hybrid Network Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi,and Jianping Wu Department of Computer Science

More information

A Two-Stage Approach For Network Monitoring

A Two-Stage Approach For Network Monitoring Noname manuscript No. (will be inserted by the editor) A Two-Stage Approach For Network Monitoring Linda Bai Sumit Roy Received: date / Accepted: date Abstract A goal of network tomography is to infer

More information

Oligopoly Games under Asymmetric Costs and an Application to Energy Production

Oligopoly Games under Asymmetric Costs and an Application to Energy Production Oligopoly Games under Asymmetric Costs and an Application to Energy Production Andrew Ledvina Ronnie Sircar First version: July 20; revised January 202 and March 202 Astract Oligopolies in which firms

More information

A DA Serial Multiplier Technique based on 32- Tap FIR Filter for Audio Application

A DA Serial Multiplier Technique based on 32- Tap FIR Filter for Audio Application A DA Serial Multiplier Technique ased on 32- Tap FIR Filter for Audio Application K Balraj 1, Ashish Raman 2, Dinesh Chand Gupta 3 Department of ECE Department of ECE Department of ECE Dr. B.R. Amedkar

More information

Advanced and Authenticated Marking Schemes for IP Traceback

Advanced and Authenticated Marking Schemes for IP Traceback IEEE INFOCOM 2 Advanced and Authenticated Marking Schemes for IP Traceack Dawn Xiaodong Song and Adrian Perrig dawnsong, perrig @cs.erkeley.edu Computer Science Department University of California, Berkeley

More information

Section 0.3 Power and exponential functions

Section 0.3 Power and exponential functions Section 0.3 Power and eponential functions (5/6/07) Overview: As we will see in later chapters, man mathematical models use power functions = n and eponential functions =. The definitions and asic properties

More information

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot

More information

Link Status Monitoring Using Network Coding

Link Status Monitoring Using Network Coding Link Status Monitoring Using Network Coding Mohammad H. Firooz, Student Member, IEEE, Sumit Roy, Fellow, IEEE, Christopher Lydick, Student Member, IEEE, and Linda Bai, Student Member, IEEE Abstract In

More information

WITH THE RAPID growth of the Internet, overlay networks

WITH THE RAPID growth of the Internet, overlay networks 2182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 Network Topology Inference Based on End-to-End Measurements Xing Jin, Student Member, IEEE, W.-P. Ken Yiu, Student

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

A Binary Recursive Gcd Algorithm

A Binary Recursive Gcd Algorithm A Binary Recursive Gcd Algorithm Damien Stehlé and Paul Zimmermann LORIA/INRIA Lorraine, 615 rue du jardin otanique, BP 101, F-5460 Villers-lès-Nancy, France, {stehle,zimmerma}@loria.fr Astract. The inary

More information

Truthful and Non-Monetary Mechanism for Direct Data Exchange

Truthful and Non-Monetary Mechanism for Direct Data Exchange Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {ihou, yupinhsu, spalex}@tamu.edu

More information

A New 128-bit Key Stream Cipher LEX

A New 128-bit Key Stream Cipher LEX A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.

More information

A Network Coding Approach to Overlay Network Monitoring

A Network Coding Approach to Overlay Network Monitoring Network oding pproach to Overlay Network Monitoring hristina Fragouli École Polytechnique Fédérale de Lausanne christina.fragouli@epfl.ch thina Markopoulou Stanford University amarko@stanfordalumni.org

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding

Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Vahid Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Abstract Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

On Routing Asymmetry in the Internet

On Routing Asymmetry in the Internet On Routing Asymmetry in the Internet Yihua He Michalis Faloutsos Srikanth Krishnamurthy Bradley Huffaker yhe@cs.ucr.edu michalis@cs.ucr.edu krish@cs.ucr.edu bhuffake@caida.org Department of Computer Science

More information

Generalized DCell Structure for Load-Balanced Data Center Networks

Generalized DCell Structure for Load-Balanced Data Center Networks Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee,JunLi, Xinchao Zhang, Chuanxiong Guo,DavidRincón Swarthmore College, Duke University, Fudan University, Shanghai

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Optical interconnection networks with time slot routing

Optical interconnection networks with time slot routing Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and

More information