Binary vs Analogue Path Monitoring in IP Networks
|
|
|
- Ira Potter
- 10 years ago
- Views:
Transcription
1 Binary vs Analogue Path Monitoring in IP Networks Hung X. Nguyen and Patrick Thiran School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland {hung.nguyen, Abstract. Monitoring systems that can detect path outages and periods of degraded performance are important for many distributed applications. Trivial pair-wise probing systems do not scale well and cannot be employed in large networks. To build scalable path monitoring systems, two different approaches have been proposed in the literature. The first approach [1], which we call the continuous or analogue model, takes real measurement values and infers the performance metrics of unmeasured paths using traditional (+, ) algebra. The second approach [2], which we call the Boolean model, takes binary values from measurements (e.g., whether the delay/loss of an end-to-end path is above a given threshold) and infers the performance quality of unmeasured paths using Boolean algebra. Both approaches exploit the fact that end-to-end paths share network links and hence that the measurements of some paths can be used to infer the performance on others. In this work, we are only interested in detecting whether the performance of a path is below an acceptable level or not. We show that when the number of beacons (nodes that can send probes and collect monitoring information) is small, the Boolean model requires fewer direct measurements; whereas for a large number of beacons the continuous model requires fewer direct measurements. When the number of beacons is significantly large, however, there is no difference in terms of the number of paths that we need to measure directly in both models. We verify the results by simulations on inferred network topologies and on real measurement data. 1 Introduction Network dynamics may significantly affect the performance of distributed applications such as distributed system management, replicated services, and application layer multicast [3]. Robust and efficient distributed systems therefore need to adapt their behavior to environment changes. Loss rate monitoring systems that can detect path outages and periods of degraded performance can both facilitate distributed system management (such as virtual private network (VPN) or a content distribution network), and help build adaptive overlay applications, e.g., streaming media [4]. Monitoring systems that target small networks [5] usually employ pair-wise probing where each node probes the paths from itself to all other nodes. For
2 2 a network monitoring system with n B beacons, the number of possible endto-end measurements is O(n 2 B ). Therefore, active end-to-end measurement in such settings does not scale well and as a result cannot be deployed for complete network-wide measurement. Furthermore, this approach generates highly redundant measurements where many links in the network are repeatedly measured. It is therefore important to have a scalable overlay monitoring system that does not generate redundant information. Existing scalable network estimation systems determine network characteristics by measuring end-to-end paths periodically. To monitor a path, a node at one end of the path periodically sends probe packets to the node at the other end. From the delay characteristics and delivery status of these probe/acknowledgement packet pairs, the sending node can infer the quality of the path. This method is similar to network tomography approaches that infer the internal network characteristics based on end-to-end observations. Network tomography has been extensively studied in the literature( [6] provides a detailed survey). However, to the best of our knowledge, none of the existing tomography works deal with minimizing the number of probes that need to be sent in a tomography system. Chen et al. [1] have shown that it is possible to reconstruct complete end-toend path properties exactly from the measurements of only a subset of paths. The results in [1] are based on a linear algebraic analysis of routing matrices of the monitoring systems where a routing matrix is the binary matrix that specifies the links that occur in a given path. Since a maximal set of independent paths can be used to recover any other path in the network, it is enough to monitor only this set. The number of independent paths in a monitoring system, which is the rank of the routing matrix, tends to be much smaller than the total number of paths. A similar approach is given in [7] where only bounded estimations for network paths can be achieved. Chua et al. [8] show that a significantly smaller number of direct path measurements than that are required by the monitoring systems of [1] can be used to approximate some network wide properties. Padmanabhan et al. [9] studied the end-to-end packet loss rate experienced by clients of the Web server at microsoft.com. They report that the correlation between end-to-end loss rate and hop count is weak, which suggests that endto-end paths are dominated by a few lossy links. Furthermore, the end-to-end loss rate is stable for several minutes. A notable feature of the model considered in [9] is that its parameters (the loss rates on the logical links) are not statistically identifiable from the data (the server-to-clients loss rate), meaning that there exist different sets of parameters that give rise to the same statistical distribution of data. Although the model is not statistically identifiable, some methods proposed in [9] are quite successful in identifying the lossiest links, both in simulated and real networks. The underlying reasons behind the success of the methods in [9] are the nature of link performance in the studied networks [10]. In such networks, suppose that we can classify links as good or bad with performance measures sufficiently far apart, then the performance experienced along a network path will be bad only if one of its constituent links is bad. Duffield et al. [10] calls this kind of link performance a separable perfor-
3 3 mance and identifies many separable performance metrics of network links such as connectivity, high-low loss model, and delay spike model. A special case of separable performance, where links are either up or down, has been widely studied in the literature [2, 11, 12]. In our previous work [2], we showed that analogously to the work of Chen et al. [1], it is sufficient to monitor only a subset of end-to-end paths to infer the connectivity of all end-toend paths in the network. The difference between [1] and our model is that our model relies on Boolean (max, ) algebra instead of traditional (+, ) algebra (which we also refer to as the continuous model ). The end-to-end paths that need to be monitored are those that form the basis of the row space of the routing matrix in this Boolean algebra. In this work, we compare the efficiency of the continuous and Boolean path monitoring systems for separable performance metrics. Since we are only interested in the classification of links as good or bad, depending on whether the metric of interest has exceeded or not a given threshold, the continuous and Boolean models bring the same information. To obtain this same information, however, they will need different sets of end-to-end measurements. Thus we want to determine the system that uses fewer direct path measurements. Specifically, we are interested in comparing the dimension of the basis of the vector space in Boolean algebra for the Boolean model with the dimension of the basis of the same vector space in traditional (+, ) algebra for the continuous model. Our main contributions are as follows. First, we show that the Boolean model in [2] can be used for other separable performance metrics. Second, by simulations on Rocketfuel topologies [13], we show that for a separable performance when the number of beacons is small, it is better to use the Boolean model. On the contrary, when the number of beacons is large, it is better to use the continuous model. However, when the number of beacons is significantly large, both models result in the same number of paths that need to be measured directly. We also provide some intuitive explanations for the simulation results. Finally, we verify our results on the data set gathered by the NLANR s AMP infrastructure [14]. The remainder of this paper is organized as follows. We introduces the network models and the basic algorithms in Section 2. We presents the numerical comparison of the two models on Rocketfuel ISP topologies in Section 3. Evaluations of the performance of the models on the NLANR s AMP active measurement infrastructure are given in Section 4. Finally, we conclude the paper in Section 5. 2 Network Model and Basic Algorithms The network is modelled as an undirected graph G(V, E), where the graph nodes, V, denote the network components and the edges, E, represent the communication links connecting them. The number of nodes and edges is denoted by n = V
4 4 and e = E, respectively. Suppose there are n B beacons that belong to a single or confederated overlay monitoring system. They cooperate to share an overlay monitoring service, and are instrumented by a central authority. The set of all beacons is denoted by V B. Furthermore, we use P s,t to denote the path traversed by an IP packet from a source node s to a destination node t. Let P be the set of all paths between the beacons on the network and let n p = P. For a known topology G = (V, E) and a set of paths P, we can compute the routing matrix D of dimension n p e as follows. The entry D ij = 1 if the path P s,t P i, with i = (s,t), contains the link e j and D ij = 0 otherwise. A row of D therefore corresponds to a path, whereas a column corresponds to a link. Note here that if a column contains only zero entries, the link corresponding to that column does not have any effect on the performance of the paths in P. We drop these columns from the routing matrix to obtain a matrix of dimensions n p n l, where n l e is the number of links that are covered by at least one path in P. Our performance model is as follows. During some measurement period, each beacon sends a set of packets to each destination (chosen among other beacons). When traversing link e j, each packet is subject to a performance degradation (e.g. loss or delay) according to a distribution specified by a parameter φ ej. If the path P i comprises links e 1,...,e m, the performance degradation along the path follows a composite distribution described by the parameters φ i = {φ e1,...,φ em }. 2.1 Continuous (+, ) algebraic model In the continuous model [1], the performance parameters φ take values in R. Let y R np be a vector that represents a metric measured on all paths P i P. y is linearly related to the value x R n l of that same metric over the links e j E. For example, letting φ i denote the packet loss probability on path P i and φ ej, the corresponding probability on link e j, and assuming independence among lossevents on links, the relation between the path-wise and link-wise loss probability becomes n l y = Dx = x j D ij, (1) 1 i np j=1 where y i = log(1 φ i ) and x j = log(1 φ ej ). There are n p = O(n 2 B ) equations in (1). However, in general the matrix D is rank deficient, i.e., k = rank(d) < n p. For the sake of simplicity, assume that the first k rows of D form a basis of the row vector space R(D) of D. Because every row vector d i, i > k, of D can be represented as a linear combination of the first k independent row vectors, we can write that d i = k j=1 α jd j for some α j, 1 j k. The metric y i of the path P i can be obtained from y 1,...,y k as: y i = k j=1 α jy j. Therefore, only k independent equations of the n p equations in (1) are needed to compute all elements of y, and as a result we only need to measure k paths, which form a basis of R(D), to obtain the loss rate on all paths [1].
5 5 2.2 Boolean (max, ) algebraic model In the Boolean model [2], the values of the performance parameters φ are partitioned into two subsets that we call good and bad. We call the link e j bad if and only if its parameter φ ej is bad and we call the path P i = {e 1,...,e m } bad if and only if φ i is bad. The partitions are called separable when a path is bad if and only if at least one of its constituent links is bad. For example, in the loss model LM 1 of [9], good links have loss rates φ ej uniformly distributed between 0% and 1%; bad links have loss rates uniformly distributed between 5% and 10%. Taking the threshold between good and bad path transmission rates as 0.95, this model is separable if each path does not contain more than 5 links. In a separable model, a path is bad if and only if at least one of its constituent links is bad. If we use the variable y i to represent whether the path P i is good (y i = 0) or bad (y i = 1) and the variable x j is used to represent whether the network link e j is good (x j = 0) or bad (x j = 1), we then have: y i = n l j=1 x j D ij for all i, (2) where denotes the binary max operation, and denotes the usual multiplication operation. Let us now introduce some concepts of Boolean vector spaces that are useful for the analysis of the Boolean model. Let D = {d i } 1 i h be a set of binary vectors of equal length, and let I = {1,...,h} be the index set of D. A vector span S can be defined on D as follows. Definition 1. [Vector span] The vector span of D is S = <D> = { i I α i d i α i {0,1},d i D} Vectors in D are called the generator vectors of S. It was shown in [2] that each vector span <D> has a unique basis B, which is the smallest set of vectors in D such that all other vectors in < D > can be written as a linear combination of vectors in B. Let b = B, b is called the dimension of < D>. Without loss of generality, we assume that the first b rows of D form a basis of the row span < D > of D. Because every row vector d i, i > b, of D can be represented by a linear combination of the first b independent row vectors, we can write that d i = b j=1 α j d j for some α j. The value y i of the path P i can be obtained from y 1,...,y b as: y i = b j=1 α j y j. Therefore, only b independent equations of the n p equations in (2) are needed to compute all elements of y, and hence we only need to measure b paths, which form a basis of <D>, to determine whether any path in the overlay system is good or bad. 2.3 A brief comparison of the two models If we are only interested in the classification of end-to-end paths as good or bad, the continuous and Boolean models bring the same information. However,
6 6 as we will show in this section, the two models use different algebraic structures, and as a result, they usually need different sets of end-to-end measurements to obtain this same information. General properties relating network topologies with the dependency between measurement paths in the continuous and Boolean models are kept for future work. In this section, we are interested in the conditions under which a set of linearly dependent/independent vectors in the continuous model is dependent/independent in the Boolean model and vice versa. The observations in this section are useful to explain the results of our simulation and experimental studies in Sections 3 and 4. We first show that a linearly dependent set of vectors in (+, ) algebra is not necessarily linearly dependent in Boolean algebra and vice versa. This assertion can be verified in the following examples. The set of four vectors: d 1 = {1,1,1,1},d 2 = {0,0,1,1},d 3 = {1,1,1,0} and d 4 = {0,1,0,1} is linearly dependent in Boolean algebra as d 1 = d 2 d 3 d 4, but is linearly independent in (+, ) algebra; whereas the set of four vectors: d 1 = {1,0,0,1},d 2 = {0,0,1,1},d 3 = {1,1,0,0} and d 4 = {0,1,1,0} is linearly dependent in (+, ) algebra as d 1 = d 2 + d 3 d 4 but not in Boolean algebra. It is not difficult to verify that for the Boolean model, the necessary and also sufficient condition for a set of vectors to be dependent is that one vector has entries of 1s at all the positions where other vectors have entries of 1s. Clearly, this statement does not apply for the continuous model as shown in the first example. 3 Numerical evaluations We conducted a series of numerical studies in order to obtain a preliminary comparison of the efficiency of the continuous and Boolean models in monitoring end-to-end network properties. We perform our investigations on three backbone ISP topologies with sizes ranging from small (Exodus: 80 nodes and 147 links) to medium (Telstra: 115 nodes and 153 links), and large (Tiscali: 164 nodes and 328 links). For the sake of simplicity, we assume that all the ISPs use shortest path routing to route traffic. In this section, we summarize our findings and provide explanations for the results in the context of the Rocketfuel topologies. Recall that n is the number of nodes in the network. In our experiments, the number of beacons V B is varied from n/50 to n/2. We select the beacon candidates randomly by picking a random permutation of the set of nodes in the network. After building the routing matrix as in Section 2, we first calculate the rank of the routing matrix D to obtain the number of end-to-end measurements for the continuous model, and then use the PS algorithm in [2] to find the number of end-to-end measurements for the Boolean model. For each topology, we plot the percentage of independent paths returned by the PS algorithm (for the Boolean model) and the rank of the matrix D (for the continuous model) for different numbers of beacons. Fig. 1 shows the results for the Exodus topology. We observe that for a small number of beacons V B (less than 5%) the Boolean model requires fewer direct
7 7 directly measured measured in the continuous model measured in the Boolean model Percentage of nodes that are used as beacons V B /n Fig. 1. measured directly for complete determination of the quality of all paths in the Exodus topology with 80 nodes and 147 links. measurements, whereas for a larger number of beacons V B (between 10%-40%) the continuous model requires fewer direct measurements. However, when the percentage of beacons is above 50%, both models require the same number of direct measurements. Similar observations can be found for the Telstra and Tiscali topologies, as shown in Fig. 2 and 3, even though the exact percentages at which the two curves representing the binary and continuous model cross are different in each topology. The results suggest that although all topologies exhibit the same tendencies for the number of direct measurements in the continuous and Boolean model, exact results in each network are sensitive to the network topology. We also observe that for all three topologies, the percentages of required direct measurements for both continuous and Boolean models drop rapidly with the number of beacons when the latter is small. However, these percentages decrease slowly when the number of beacons is large. This observation suggests that the benefit of introducing additional beacons lessens with the increase of the number of beacons. The above observations can be explained by the structure of a basis of a vector space in (+, ) algebra and the basis of a vector span in Boolean algebra. In the Boolean model, and contrary to the continuous model, if all links in a path are also present in some other paths, then the first path is redundant because it is a linear combination of the other paths. When the number of paths is small, this situation frequently occurs in the studied ISP networks. In (+, ) algebra, the rank of a matrix is upper bounded by the minimum of the number of rows and columns in the matrix. Hence, when we initially increase the number of
8 8 directly measured measured in the continuous model measured in the Boolean model Percentage of nodes that are used as beacons V B /n Fig. 2. measured directly for complete determination of the quality of all paths in the Telstra topology with 115 nodes and 153 links. directly measured measured in the continuous model measured in the Boolean model Percentage of nodes that are used as beacons V B /n Fig. 3. measured directly for complete determination of the quality of all paths in the Tiscali topology with 164 nodes and 328 links.
9 9 paths (i.e., the number of rows) the dimension of the basis rapidly increases. But when the rank of the matrix approaches the number of columns, which stays almost constant, it increases only slowly. When there are a lot of paths, both the Boolean vector span and continuous vector space have the same basis that contains mostly unit vectors (vectors that have only one 1 entry). 4 Internet evaluation In this section, we compare the performance of the continuous and the binary models on the data collected from the NLANR s AMP (Active Measurement Project) [14] measurement infrastructure, which performs site-to-site active measurements between campuses connected by high performance networks (most of them at NSF-funded HPC-sites). The NLANR measurement infrastructure consists of approximately 140 monitors and about 15,000 end-to-end paths. Each monitor performs RTT, topology and throughput tests to all other monitors. More details can be found at [14]. We have analyzed the data collected by AMP on the 23rd of January, After grouping the common edges and nodes in all end-to-end paths, we have a sample of 133 monitors and end-to-end paths that cover 9405 nodes and directed edges. Note here that the number of available monitors (133 monitors) is significantly smaller than the number of nodes (9405 nodes) in the systems. The AMP system is therefore operating in the regime where only a small percentage (below 1.4%) of nodes are used as beacons. To evaluate the effect of the number of beacons on the two models, we vary the number of beacons from 1 to 133, which corresponds to 0.01%-1.4% of the total number of nodes. We then construct the routing matrix D and calculate the rank of D to obtain the number of end-to-end measurements for the continuous model. We also calculate the number of independent paths in the Boolean model using the PS algorithm in [2]. The results are plotted in Fig. 4. We observe that the results reflect the behaviors that we have already seen for the Rocketfuel topologies. That is, in the regime where the percentage of nodes that are used as beacons is very small (below 1% in this case) the Boolean model requires fewer direct measurements if we are only interested in separable good or bad performance of paths. However, the difference between the two models is very small for this range, which can be explained by the fact that in this case most of the end-to-end paths in the network are independent in both models. We suspect that the difference becomes more important, and in favor of the continuous model, for larger numbers of beacons. Furthermore, for both the continuous and Boolean models the percentage of direct measurements drops rapidly as the number of beacons increases. We also evaluate the accuracy of the two approaches on predicting the quality of unmeasured paths. For this purpose, we proceed as follows. First, we fix the number of beacons. We then determine the set of independent paths in the continuous and Boolean models. We called these independent paths the directly measured paths. Using performance data from these directly measured paths, we calculate the performance on the unmeasured paths. That is, in the continuous
10 directly measured measured in the continuous model measured in the Boolean model Number of beacons V B Fig. 4. measured directly for complete determination of the quality of all paths in the NLANR s AMP monitoring system. model, we calculate the loss rates on all unmeasured paths and compare them against a loss threshold of 5%, which is the threshold between tolerable loss and serious loss as defined in [15], to determine whether the path is good or bad. In the Boolean model, we first determine the quality of the directly measured paths and then calculate the quality on the unmeasured paths. We compare the inferred results of the two models against the real measurement data. The results are given in Table 1. We observe that both models achieve Table 1. Accuracy of the continuous and Boolean models. CV is the coverage rate and FP is the false positive rate Number of beacons The continuous model The Boolean model 2 CV = 99.7%, FP = 0.3% CV = 98.7%, FP = 0.9% 100 CV = 97.2%, FP = 3.4% CV = 95.6%, FP = 4.7 % a high coverage rate and a low false positive rate. The Boolean model is less accurate than the continuous model because the Boolean model relies on the assumption that the loss rates of network paths and links are separable, which sometimes does not hold in practice.
11 11 5 Conclusion In this paper, we have compared the performance of two end-to-end path monitoring approaches. We show that when the number of beacons is small, the Boolean model requires fewer direct measurements; but the difference appear to be very small on real measurements. For a large number of beacons the continuous model requires fewer direct measurements, and the different can be quite significant. However, when the number of beacons is significantly large, there is no difference in terms of the number of paths that we need to measure directly in both models. We verify the results by simulations on existing ISP topologies and on real measurement infrastructure. We are currently working on various extensions of this work. First, we are investigating the influence of the structure of the routing matrix on the differences between the number of probes required for the continuous and Boolean models. Second, so far in this work we have taken the restriction that nodes in the monitoring systems can send probes only to other nodes in the monitoring systems. However, since probes can be sent to many other nodes in the network, we are investigating how sending probes to other nodes in the network would affect the efficiency of the monitoring system in both the continuous and Boolean models. Acknowledgements Hung X. Nguyen s work is financially supported by grant DICS 1830 of the Hasler Foundation, Bern, Switzerland. We would like to thank the researchers at the NLANR s Active Measurement Project for access to their raw data and the anonymous reviewer who gave us a pointer to these data. References 1. Chen, Y., Bindel, D., Song, H., Katz, R.H.: An algebraic approach to practical and scalable overlay network monitoring. In: Proceedings of the ACM SIGCOMM, Portland (2004) 2. H.X.Nguyen, Thiran, P.: Active measurement for failure diagnosis in IP networks. In: Proceedings of the Passive and Active Measurment Workshop, Juan-les-Pins, France (2004) Braynard, R., Kostic, D., Rodriguez, A., Chase, J., Vahdat, A.: Opus: an overlay peer utility service. In: Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH). (2002) 4. Chen, Y.: Toward a Scalable, Adaptive and Network-aware Content Distribution Network. PhD thesis, University of carlifornia at Berkeley (2003) 5. Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: Resilient overlay networks. In: Proceeding of the 18th ACM Symp. on Operating System Priciples. (2001) Coates, M., Hero, A., Nowak, R., Yu, B.: Internet tomography. IEEE Signal Processing Magazine 19 (2002)
12 12 7. Tang, C., McKinley, P.: On the cost-quality tradeoff in topology-aware overlay path probing. In: Proceedings of the IEEE ICNP. (2003) 8. Chua, D.B., Kolaczyk, E.D., Crovella, M.: Efficient monitoring of end-to-end network properties. private communication (2004) 9. Padmanabhan, V.N., Qiu, L., Wang, H.J.: Server-based inference of internet performance. In: Proceedings of the IEEE INFOCOM 03, San Francisco, CA (2003) 10. N.Duffield: Simple network perormance tomography. In: Proceedings of the IMC 03, Miami Beach, Florida (2003) 11. Bejerano, Y., Rastogi, R.: Robust monitoring of link delays and faults in IP networks. In: Proceedings of the IEEE INFOCOM 03, San Francisco (2003) 12. Horton, J., Lopez-Ortiz, A.: On the number of distributed measurement points for network tomography. In: Proceedings of IMC 03, Florida (2003) 13. Spring, N., Mahajanand, R., Wetherall, D.: Measuring ISP topologies with Rocketfuel. In: Proceedings of the ACM SIGCOMM. (2002) 14. AMP web site: (Accessed January 2005) 15. Zhang, Y., Duffield, N., Paxson, V., Shenker, S.: On the constancy of internet path properties. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop, San Francisco (2001)
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Joint Optimization of Monitor Location and Network Anomaly Detection
Joint Optimization of Monitor Location and Network Anomaly Detection Emna Salhi, Samer Lahoud, Bernard Cousin ATNET Research Team, IRISA University of Rennes I, France {emna.salhi, samer.lahoud, bernard.cousin}@irisa.fr
Traceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Network Monitoring in Multicast Networks Using Network Coding
Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: [email protected] Ben Leong, Yu-Han Chang, Yonggang Wen
Tomography-based Overlay Network Monitoring
Tomography-based Overlay Network Monitoring Yan Chen, David Bindel, Randy H. Katz Computer Science Division University of California at Berkeley Berkeley, CA 947-776, USA {yanchen, dbindel, randy}@cs.berkeley.edu
Virtual Landmarks for the Internet
Virtual Landmarks for the Internet Liying Tang Mark Crovella Boston University Computer Science Internet Distance Matters! Useful for configuring Content delivery networks Peer to peer applications Multiuser
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering
Effective Network Monitoring
Effective Network Monitoring Yuri Breitbart, Feodor Dragan, Hassan Gobjuka Department of Computer Science Kent State University Kent, OH 44242 {yuri,dragan,hgobjuka}@cs.kent.edu 1 Abstract Various network
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research
Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding
Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Vahid Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723
Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Authors: Sonia Fahmy, Department of Computer Science, Purdue University Address: 305 N. University St., West Lafayette,
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems?
Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems? Chris Kelly - [email protected] Research Network Operations Center Georgia Tech Office
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
WITH THE RAPID growth of the Internet, overlay networks
2182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 Network Topology Inference Based on End-to-End Measurements Xing Jin, Student Member, IEEE, W.-P. Ken Yiu, Student
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Towards Unbiased End-to-End Network Diagnosis
Towards Unbiased End-to-End Network Diagnosis Yao Zhao, Yan Chen Northwestern University {yzhao, ychen}@cs.northwestern.edu David Bindel University of California at Berkeley [email protected] ABSTRACT
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Network Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Service Provisioning and Management in Virtual Private Active Networks
Service Provisioning and Management in Virtual Private Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP) 13083-970, Campinas-SP, Brazil
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Probe Station Placement for Robust Monitoring of Networks
Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: [email protected] Adarshpal S. Sethi
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
II. BANDWIDTH MEASUREMENT MODELS AND TOOLS
FEAT: Improving Accuracy in End-to-end Available Bandwidth Measurement Qiang Wang and Liang Cheng Laboratory Of Networking Group (LONGLAB, http://long.cse.lehigh.edu) Department of Computer Science and
Probability-Model based Network Traffic Matrix Estimation
Computer Science and Information Systems ():309 30 DOI: 0.98/CSIS3000T Probability-Model based Network Traffic Matrix Estimation Hui Tian, Yingpeng Sang, Hong Shen 3,4, and Chunyue Zhou School of Electronics
MAPS: Adaptive Path Selection for Multipath Transport Protocols in the Internet
MAPS: Adaptive Path Selection for Multipath Transport Protocols in the Internet TR-11-09 Yu Chen Xin Wu Xiaowei Yang Department of Computer Science, Duke University {yuchen, xinwu, xwy}@cs.duke.edu ABSTRACT
Enhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Measurement-aware Monitor Placement and Routing
Measurement-aware Monitor Placement and Routing A Joint Optimization Approach for Network-Wide Measurements Guanyao Huang 1 Chia-Wei Chang Chen-Nee Chuah 1 Bill Lin 1 University of California at Davis,
An Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
Restorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Efficient Data Retrieving in Distributed Datastreaming
Efficient Data Retrieving in Distributed Datastreaming Environments Yunhao Liu, Jun Miao, Lionel M. Ni, and Jinsong Han Department of Computer Science Hong Kong University of Science and Technology Clear
Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
On Routing Asymmetry in the Internet
On Routing Asymmetry in the Internet Yihua He Michalis Faloutsos Srikanth Krishnamurthy Bradley Huffaker [email protected] [email protected] [email protected] [email protected] Department of Computer Science
