 Don Towsley 2000 Network Tomography for the Internet: Open Problems D. Towsley U. Massachusetts.

Slides:



Advertisements
Similar presentations
Collaborators: Mark Coates, Rui Castro, Ryan King, Mike Rabbat, Yolanda Tsang, Vinay Ribeiro, Shri Sarvotham, Rolf Reidi Network Bandwidth Estimation and.
Advertisements

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
1 Synchronizing Management Information using Traffic Pattern Matching Technique Kohei Ohta, Yohsuke Takei, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto Cyber.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Lo Presti 1 Network Tomography Francesco Lo Presti Dipartimento di Informatica - Università dell’Aquila.
Locating Bottleneck/Congested Links Jeng Lung WebTP Meeting 11/8/99.
1 Ossama Younis and Sonia Fahmy Department of Computer Sciences Purdue University For slides, technical report, and implementation, please see:
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
15-441: Computer Networking Lecture 26: Networking Future.
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
Department of Computer Science, Purdue University Active Networks: Applications, Security, Safety and Architectures Author: Konstantinos Psounis Stanford.
Maximum Likelihood Network Topology Identification Mark Coates McGill University Robert Nowak Rui Castro Rice University DYNAMICS May 5 th,2003.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Network Tomography from Multiple Senders Rob Nowak Thursday, January 15, 2004 In collaboration with Mark Coates and Michael Rabbat.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
1 End-to-End Detection of Shared Bottlenecks Sridhar Machiraju and Weidong Cui Sahara Winter Retreat 2003.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Network Tomography through End- End Multicast Measurements D. Towsley U. Massachusetts collaborators: R. Caceres, N. Duffield, F. Lo Presti (AT&T) T. Bu,
Detecting Shared Congestion of Flows Via End- to-end Measurement (and other inference problems) Dan Rubenstein joint work with Jim Kurose and Don Towsley.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
FTDCS 2003 Network Tomography based Unresponsive Flow Detection and Control Authors Ahsan Habib, Bharat Bhragava Presenter Mohamed.
Network Tomography (A presentation for STAT 593E) Mingyan Li Radha Sampigethaya.
Rafael C. Nunez - Gonzalo R. Arce Department of Electrical and Computer Engineering University of Delaware May 19 th, 2005 Diffusion Marking Mechanisms.
Detecting Shared Congestion of Flows Via End- to-end Measurement Dan Rubenstein Jim Kurose Don Towsley Computer Networks Research Group.
1 An Information Theoretic Approach to Network Trace Compression Y. Liu, D. Towsley, J. Weng and D. Goeckel.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
1 Network Tomography Don Towsley UMass-Amherst. 2 Network Tomography - I Goal: obtain detailed picture of a network/internet from end-to-end views  infer.
Computer Science 1 Characterizing Link Properties Using “Loss-pairs” Jun Liu (joint work with Prof. Mark Crovella)
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
Not All Microseconds are Equal: Fine-Grained Per-Flow Measurements with Reference Latency Interpolation Myungjin Lee †, Nick Duffield‡, Ramana Rao Kompella†
Network Planète Chadi Barakat
Particle Filtering in Network Tomography
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
CS790 Technical Writing for Computer Scientists Summer 2007 How to Write Short Project Descriptions Sue Moon KAIST.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Measurement and Modeling of Packet Loss in the Internet Maya Yajnik.
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
Internet Performance Measurements and Measurement Techniques Jim Kurose Department of Computer Science University of Massachusetts/Amherst
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Detecting the Long-Range Dependence in the Internet Traffic with Packet Trains Péter Hága, Gábor Vattay Department Of Physics of Complex Systems Eötvös.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Trajectory Sampling for Direct Traffic Oberservation N.G. Duffield and Matthias Grossglauser IEEE/ACM Transactions on Networking, Vol. 9, No. 3 June 2001.
N. Hu (CMU)L. Li (Bell labs) Z. M. Mao. (U. Michigan) P. Steenkiste (CMU) J. Wang (AT&T) Infocom 2005 Presented By Mohammad Malli PhD student seminar Planete.
Flow and Congestion Control for Reliable Multicast Communication In Wide-Area Networks Supratik Bhattacharyya Department of Computer Science University.
1 Network Tomography Using Passive End-to-End Measurements Venkata N. Padmanabhan Lili Qiu Helen J. Wang Microsoft Research DIMACS’2002.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
정하경 MMLAB Fundamentals of Internet Measurement: a Tutorial Nevil Brownlee, Chris Lossley, “Fundamentals of Internet Measurement: a Tutorial,” CMG journal.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
Internet Measurement and Analysis Vinay Ribeiro Shriram Sarvotham Rolf Riedi Richard Baraniuk Rice University.
Precision Measurements with the EVERGROW Traffic Observatory Péter Hága István Csabai.
Measurement and Modelling of the Temporal Dependence in Packet loss Maya Yajnik, Sue Moon, Jim Kurose, Don Towsley Department of Computer Science University.
PathChirp Efficient Available Bandwidth Estimation Vinay Ribeiro Rice University Rolf Riedi Rich Baraniuk.
Lo Presti 1 Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING Network.
November 10, 2010IETF 79 – Beijing, China A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-01 Alessandro Capello Luca.
1 Network Tomography Using Passive End-to-End Measurements Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang.
March 22, 2010IETF 77 – Anaheim, USA1 A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-00 Alessandro Capello Luca Castaldelli.
Parallel Autonomous Cyber Systems Monitoring and Protection
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
CPSC 641: WAN Measurement Carey Williamson
Dogu Arifler and Brian L. Evans
Carey Williamson Department of Computer Science University of Calgary
Transport Layer Identification of P2P Traffic
Presentation transcript:

 Don Towsley 2000 Network Tomography for the Internet: Open Problems D. Towsley U. Massachusetts

 Don Towsley 2000 Network Tomography: I Goal: obtain spatio-temporal picture of a network/internet from end-to-end views ? Infrastructure (NIMI) Avg. Delay cross section view LOSS % cross section view LOSS % Avg. Delay composition of views LOSS % Delay ?

 Don Towsley 2000 Rationale Why? v network management: bottlenecks/faults v agreement verification v adaptive applications: loss, delay, shared point of congestion Why not query routers? v 1000s of autonomous systems v 100,000s routers v need special privileges v router info not always complete

 Don Towsley 2000 Example: MINC Uses end-end observations to peer inside network o multicast probes o correlated performance observed by receivers o exploit correlation to estimate link behavior v loss rates v delay statistics receivers source  ,  ,   ^^^ 11  33 loss rates

 Don Towsley 2000 Inference Methodology (Losses) o model v known multicast tree topology  independent Bernoulli processes across all links with unknown loss prob. {  k } o methodology  maximum likelihood estimates for {  k } o extensions v link delays v topology inference

 Don Towsley 2000 Open Problems o data massaging v delay measurements exhibit many artifacts o scalability o robustness to missing data o layout/composition of views o use (partial) information from network Characteristic of any approach

 Don Towsley 2000 o most traffic is point-point o point-to-point behavior very different from multicast behavior Q: how to infer internal network behavior from point-to-point measurements? The Real Internet o introduce correlation o exploit correlation

 Don Towsley 2000 Network Tomography: II Goal: obtain detailed picture of end-end behavior from internal views v network design From internal observations, infer v end-end application-level behavior v traffic flows v workload characterization

 Don Towsley 2000 Traffic Analysis Many applications have well known protocol/port (in packet header) 21 - ftp, 23 - telnet, 80 - http ftp, Some dynamically select ports napster games denial of service attack

 Don Towsley 2000 Ftp Traffic courtesy of kc

 Don Towsley 2000 Napster: until recently courtesy of kc

 Don Towsley 2000 Challenges o application signatures v napster –signaling/data transfer pattern? v games o denial of service attack signatures napster server user 1 user 2 trace collector

 Don Towsley 2000 Summary o observations v internal v end-end o views v internal v end-end o theory needed to make this happen o correlation, correlation! o scalability, scalability! o robustness, robustness! Work with a networking specialist