1 Ossama Younis and Sonia Fahmy Department of Computer Sciences Purdue University For slides, technical report, and implementation, please see:

Slides:



Advertisements
Similar presentations
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Advertisements

Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
1 Locating Internet Bottlenecks: Algorithms, Measurement, and Implications Ningning Hu (CMU) Li Erran Li (Bell Lab) Zhuoqing Morley Mao (U. Mich) Peter.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
Bayesian Piggyback Control for Improving Real-Time Communication Quality Wei-Cheng Xiao 1 and Kuan-Ta Chen Institute of Information Science, Academia Sinica.
High Speed Networks and Internets : Multimedia Transportation and Quality of Service Meejeong Lee.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Multirate Congestion Control Using TCP Vegas Throughput Equations Anirban Mahanti Department of Computer Science University of Calgary Calgary, Alberta.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
A Case for Relative Differentiated Services and the Proportional Differentiation Model Constantinos Dovrolis Parameswaran Ramanathan University of Wisconsin-Madison.
Locating Bottleneck/Congested Links Jeng Lung WebTP Meeting 11/8/99.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
 Don Towsley 2000 Network Tomography for the Internet: Open Problems D. Towsley U. Massachusetts.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
1 Minseok Kwon and Sonia Fahmy Department of Computer Sciences Purdue University {kwonm, TCP Increase/Decrease.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
1 TCP-LP: A Distributed Algorithm for Low Priority Data Transfer Aleksandar Kuzmanovic, Edward W. Knightly Department of Electrical and Computer Engineering.
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
1 Cooperative Inter-stream Rate Control Scheme for Layered Multicast Masato KAWADA, Hiroyuki MORIKAWA, Tomonori AOYAMA, School of Engineering, The University.
On Efficient On-line Grouping of Flows with Shared Bottlenecks at Loaded Servers by O. Younis and S. Fahmy Department of Computer Sciences, Purdue University.
Network Tomography through End- End Multicast Measurements D. Towsley U. Massachusetts collaborators: R. Caceres, N. Duffield, F. Lo Presti (AT&T) T. Bu,
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
FTDCS 2003 Network Tomography based Unresponsive Flow Detection and Control Authors Ahsan Habib, Bharat Bhragava Presenter Mohamed.
RRAPID: Real-time Recovery based on Active Probing, Introspection, and Decentralization Takashi Suzuki Matthew Caesar.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
Ningning HuCarnegie Mellon University1 A Measurement Study of Internet Bottlenecks Ningning Hu (CMU) Joint work with Li Erran Li (Bell Lab) Zhuoqing Morley.
Detecting Shared Congestion of Flows Via End- to-end Measurement Dan Rubenstein Jim Kurose Don Towsley Computer Networks Research Group.
Data Center Traffic and Measurements: Available Bandwidth Estimation Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
Multicast Congestion Control in the Internet: Fairness and Scalability
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
Alok Shriram and Jasleen Kaur Presented by Moonyoung Chung Empirical Evaluation of Techniques for Measuring Available Bandwidth.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
INFOCOM A Receiver-Driven Bandwidth Sharing System (BWSS) for TCP Puneet Mehra, Avideh Zakhor UC Berkeley, USA Christophe De Vleeschouwer Université.
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
1 On Class-based Isolation of UDP, Short-lived and Long-lived TCP Flows by Selma Yilmaz Ibrahim Matta Computer Science Department Boston University.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
1 Sonia Fahmy Students: Minseok Kwon, Ossama Younis Department of Computer Sciences Purdue University For slides, technical reports, and implementations,
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
N. Hu (CMU)L. Li (Bell labs) Z. M. Mao. (U. Michigan) P. Steenkiste (CMU) J. Wang (AT&T) Infocom 2005 Presented By Mohammad Malli PhD student seminar Planete.
UNIVERSITY OF JYVÄSKYLÄ 2005 Multicast Admission Control in DiffServ Networks Department of Mathematical Information Technology University of Jyväskylä.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
PathChirp Spatio-Temporal Available Bandwidth Estimation Vinay Ribeiro Rolf Riedi, Richard Baraniuk Rice University.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
SHADOWSTREAM: PERFORMANCE EVALUATION AS A CAPABILITY IN PRODUCTION INTERNET LIVE STREAM NETWORK ACM SIGCOMM CING-YU CHU.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
TeXCP: Protecting Providers’ Networks from Unexpected Failures & Traffic Spikes Dina Katabi MIT - CSAIL nms.csail.mit.edu/~dina.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Precision Measurements with the EVERGROW Traffic Observatory Péter Hága István Csabai.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Aditya Akella The Impact of False Sharing on Shared Congestion Management Aditya Akella with Srinivasan Seshan and Hari Balakrishnan.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
TCP-LP Distributed Algorithm for Low-Priority Data Transfer
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
pathChirp Efficient Available Bandwidth Estimation
pathChirp Efficient Available Bandwidth Estimation
Presentation transcript:

1 Ossama Younis and Sonia Fahmy Department of Computer Sciences Purdue University For slides, technical report, and implementation, please see: On Efficient On-line Grouping of Flows with Shared Bottlenecks at Loaded Servers

2 Is “On-line” Tomography Useful and at What Time Scale? What is “tomography”? A method of producing (inferring) an image of the internal structures of a solid object by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures. What is “network tomography”? Internet mapping (routes, per-segment delays, per-segment losses, per-segment bandwidth, shared bottlenecks) via composing end-to-end measurements.

3 Why FlowMate? Source Receiver

4 Why FlowMate? Partitioning flows emerging from the same source (busy server) according to shared bottlenecks is useful for:  Customized, more fair and more responsive coordinated congestion management.  Overlay networks (e.g., application-layer multicast and peer-to-peer applications).  Load balancing.  Pricing.  Traffic engineering and admission control.

5 The Problem Input: A set of flows (micro or macro), F, originating at the same source, where F = { f 1, f 2, …, f n } Required: Periodically map each flow f i (1  i  n) to a group g j (1  j  m)  G = { g 1, g 2, …, g m }, m  n, where all flows f  g j  G share a common bottleneck

6 FlowMate Features Employs passive probing to reduce generation and processing overhead and network load with a large number of flows. Employs on-line partitioning based on constantly changing shared bottlenecks. Works with or without receiver timestamp support (and no router support). Reduces overhead using representatives. Uses limited history for stability (no samples).

7 Architecture Transport layer implementation enables more accurate timestamping

8 Basic Algorithm [O(NG)] Initialize: Empty group list and flow table. Repeat forever: - Collect delay Information. - Check triggering condition. - If (triggered): partition flows and generate lists. - Delete delay samples and maintain compact history information. Partitioning: - Select delay samples. - Assign a representative flow for each group. - Each flow is tested against each representative, and joins the group with highest correlation. - A flow either joins a group or forms a new one.

9 Shared Bottleneck Test For two flows f1 and f2 sharing a common bottleneck in sr [Rubenstein00]: The cross correlation measure of multiplexed (f1, f2) packets, spaced apart by time t > 0, is higher than the auto correlation measure of packets of f1 or f2, spaced apart by time T > t. s r

10 In-Band Delay Sampling One way delay (reasonable clock skew OK). Extend the time-stamped ACK (RFC 1323) to include packet reception time. Select samples according to inter-packet spacing. time Samples chosen as probes

11 Triggering Partitioning Time d_min d_max t Partitioning not invoked Partitioning may be invoked if enough samples for all flows Partitioning must be invoked if not invoked since t Last time partitioning was invoked Every flow with at least M samples is considered

12 Our Accuracy Index Sources of inaccuracies: false sharing and group splits A group split is not as harmful as false sharing Let k j denote the resulting number of splits of a correct group: Example: correct: {1,2,3},{4,5,6}, result: {1,2},{3,4,5},{6}, I=0.67

13 Simulation Configuration Configuration: Cross and reverse traffic: CBR sources Forward traffic: FTP, Telnet, or HTTP/1.1 Background traffic: 3 “StarWars” flows (self-similar traffic)

14 Foreground Load FlowMate accuracy (using a simpler topology) Different loads Staggered start times Correlation periods: 1, 2, 4, 6, 8, 10 seconds.

15 Background Load Load and on/off periods have little impact on average accuracy

16 Bursty Flows Telnet traffic HTTP/1.1 traffic Sampling: Flow life-time (P2P FTPs (elephants), HTTP/1.0 vs. 1.1), Packet interleaving patterns, Delayed ACKs

17 Router Buffering Buffer size vs avg index Drop policy

18 Naïve coordinated congestion management demonstrates better fairness and responsiveness Sample Application

19 Related Work Two-flow correlation tests based on delay or loss of all Poisson probe samples [Rubenstein et al., SIGMETRICS 2000]. Semi-active Bayesian probing (using shared packet loss correlations) [Harfoush et al., ICNP 2000]. Shannon or Renyi entropy-based flow clustering [Katabi et al., TR-2001 and IC3N01]. Other tomography work, e.g., [AT&T, UMass, BU, Rice, Berkeley]. Congestion Management schemes, e.g., Congestion Manager (CM) [Balakrishnan et al, SIGCOMM 99], Ensemble, Int, FastStart.

20 Conclusions FlowMate is an on-line flow partitioning scheme that does not require active probing. Partitioning is periodically performed at the flow origin for a large set of flows. FlowMate appears to be robust under heavy background load and has low overhead. High burstiness of flows to be partitioned is the main factor that degrades performance. FlowMate can be useful to many applications, such as overlay networks, congestion management, load balancing, and pricing.

21 Ongoing Work We are currently integrating FlowMate into Linux v to perform real experiments. We are studying various parameters, as well as UDP flow partitioning in more depth. More generally, we are studying the compression, composition and real-time use of inferred network properties for adaptation in overlay networks.