Maximum Likelihood Network Topology Identification Mark Coates McGill University Robert Nowak Rui Castro Rice University DYNAMICS May 5 th,2003.

Slides:



Advertisements
Similar presentations
Merging Logical Topologies Using End-to-end Measurements Michael Rabbat Mark Coates Robert Nowak Internet Measurement Conference 2003 Tuesday October 28,
Advertisements

Collaborators: Mark Coates, Rui Castro, Ryan King, Mike Rabbat, Yolanda Tsang, Vinay Ribeiro, Shri Sarvotham, Rolf Reidi Network Bandwidth Estimation and.
Bayesian Estimation in MARK
Ai in game programming it university of copenhagen Statistical Learning Methods Marco Loog.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Maximum Likelihood. Likelihood The likelihood is the probability of the data given the model.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Lo Presti 1 Network Tomography Francesco Lo Presti Dipartimento di Informatica - Università dell’Aquila.
1 Estimating Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju Randy H. Katz, Ion Stoica Electrical Engineering and Computer Science.
Server-based Inference of Internet Performance V. N. Padmanabhan, L. Qiu, and H. Wang.
Network Tomography CS 552 Richard Martin. What is Network Tomography? Derive internal state of the network from: –external measurements (probes) –Some.
1 A General Introduction to Tomography & Link Delay Inference with EM Algorithm Presented by Joe, Wenjie Jiang 21/02/2004.
Network Tomography CS 552 Richard Martin. What is Network Tomography? Derive internal state of the network from: –external measurements (probes) –Some.
1 Network Tomography Venkat Padmanabhan Lili Qiu MSR Tab Meeting 22 Oct 2001.
Network Tomography from Multiple Senders Rob Nowak Thursday, January 15, 2004 In collaboration with Mark Coates and Michael Rabbat.
Network Identifiability with Expander Graphs Hamed Firooz, Linda Bai, Sumit Roy Spring 2010.
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
Network Tomography through End- End Multicast Measurements D. Towsley U. Massachusetts collaborators: R. Caceres, N. Duffield, F. Lo Presti (AT&T) T. Bu,
Distributed-Dynamic Capacity Contracting: A congestion pricing framework for Diff-Serv Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute,
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
Network Tomography (A presentation for STAT 593E) Mingyan Li Radha Sampigethaya.
Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.
Bandwidth Measurements Jeng Lung WebTP Meeting 10/25/99.
Bayesian Learning Rong Jin.
11/4/2003ACM Multimedia 2003, Berkeley, CA1 PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hefeeda 1 Joint work with Ahsan Habib 2, Boyan.
Computer vision: models, learning and inference Chapter 10 Graphical Models.
Network Tomography CS 552 Richard Martin. What is Network Tomography? Derive internal state of the network from: –external measurements (probes) –Some.
1 Network Tomography Don Towsley UMass-Amherst. 2 Network Tomography - I Goal: obtain detailed picture of a network/internet from end-to-end views  infer.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Presented by: Randeep Singh Gakhal CMPT 886, July 2004.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
A Machine Learning-based Approach for Estimating Available Bandwidth Ling-Jyh Chen 1, Cheng-Fu Chou 2 and Bo-Chun Wang 2 1 Academia Sinica 2 National Taiwan.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Bayesian Model Selection in Factorial Designs Seminal work is by Box and Meyer Seminal work is by Box and Meyer Intuitive formulation and analytical approach,
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Particle Filtering in Network Tomography
WSEAS AIKED, Cambridge, Feature Importance in Bayesian Assessment of Newborn Brain Maturity from EEG Livia Jakaite, Vitaly Schetinin and Carsten.
Introduction to MCMC and BUGS. Computational problems More parameters -> even more parameter combinations Exact computation and grid approximation become.
2005/10/211 A Survey on Physical Network Topology Estimation October 21, 2005 Chikayama-Taura Lab. Tatsuya Shirai.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Multiple Source, Multiple Destination Network Tomography Michael Rabbat IEEE Infocom, Hong Kong Wednesday, March 10, 2004 Co-Authors: Mark Coates and Robert.
Multiscale Traffic Processing Techniques for Network Inference and Control Richard Baraniuk Edward Knightly Robert Nowak Rolf Riedi Rice University INCITE.
1 Inferring structure to make substantive conclusions: How does it work? Hypothesis testing approaches: Tests on deviances, possibly penalised (AIC/BIC,
1 Passive Network Tomography Using Bayesian Inference Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang Microsoft Research Internet Measurement.
Hung X. Nguyen and Matthew Roughan The University of Adelaide, Australia SAIL: Statistically Accurate Internet Loss Measurements.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 3 Rutgers University Internet Institute Instructor: Chris Uriarte.
Internet Performance Measurements and Measurement Techniques Jim Kurose Department of Computer Science University of Massachusetts/Amherst
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Tracking Multiple Cells By Correspondence Resolution In A Sequential Bayesian Framework Nilanjan Ray Gang Dong Scott T. Acton C.L. Brown Department of.
1 Network Tomography Using Passive End-to-End Measurements Venkata N. Padmanabhan Lili Qiu Helen J. Wang Microsoft Research DIMACS’2002.
Markov Chain Monte Carlo for LDA C. Andrieu, N. D. Freitas, and A. Doucet, An Introduction to MCMC for Machine Learning, R. M. Neal, Probabilistic.
Peer-to-Peer Media Streaming ZIGZAG - Ye Lin PROMISE – Chanjun Yang SASABE - Kung-En Lin.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Inference of Non-Overlapping Camera Network Topology by Measuring Statistical Dependence Date :
1 Chapter 8: Model Inference and Averaging Presented by Hui Fang.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Precision Measurements with the EVERGROW Traffic Observatory Péter Hága István Csabai.
Lo Presti 1 Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING Network.
1 Network Tomography Using Passive End-to-End Measurements Lili Qiu Joint work with Venkata N. Padmanabhan and Helen J. Wang.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Bayesian Inference and Visual Processing: Image Parsing & DDMCMC. Alan Yuille (Dept. Statistics. UCLA) Tu, Chen, Yuille & Zhu (ICCV 2003).
HW7: Evolutionarily conserved segments ENCODE region 009 (beta-globin locus) Multiple alignment of human, dog, and mouse 2 states: neutral (fast-evolving),
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
Bandwidth estimation: metrics, measurement techniques, and tools Presenter: Yuhang Wang.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Markov Chain Monte Carlo in R
Hierarchical Clustering and Network Topology Identification
Bayesian inference Presented by Amir Hadadi
Markov Random Fields Presented by: Vladan Radosavljevic.
Tony Sun, Guang Yang, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Presentation transcript:

Maximum Likelihood Network Topology Identification Mark Coates McGill University Robert Nowak Rui Castro Rice University DYNAMICS May 5 th,2003

Network Tomography Inferring network topology based on “external” end-to-end measurements. Traceroute requires cooperation of routers: May not be met in practice This paper assumes no internal network cooperation Solely host-based unicast measurements

How does it work? The Problem Statement R Unique Sender

How does it work? Information we have End-to-end measurements that measure the degree of correlation between receivers Associate metric  i,j with pair of receivers i,j  R Monotonicity property: p i,p j,p k : Paths from sender to i,j,k If p i shares more links with p j than with p k, then  i,j >  i,k

An example Here  18,19 >  i,19 for all other i Examples ? Simple Bottom-up merging algorithms can be used to identify full, logical topology

Two-fold Contribution Novel measurement scheme: –Sandwich Probing –Each probe: three packets –Main Idea: Small packets queues behind the large, inducing extra seperation between small packets on shared links A stochastic search method for topology identification

Sandwich Probing  01 : queuing delay of p 2 on link 0  1,  35 =  01  ij : sum of  ’s on the shared links to receiver i and j no cross-traffic: p1p1 p2p2

more shared queues  larger   34 =  01 +  12  35 =  01 Sandwich Probing

Advantages over loss and delay based metrics  Probe loss is rare on Internet. Large number of measurements required  For measuring delay, clock sync required  Each measurement contributes here.

Measurement framework Measurement of  ij contaminated by cross traffic Multiple measurements CLT Cross traffic: zero-mean effect on

Likelihood Formulation Estimated metrics are randomly distributed according to density p p parameterized by underlying topology T and set of true metric values When is viewed as function of T and , it is called the likelihood of T and .

Likelihood Formulation Maximum Likelihood Tree is given by: F denotes forest of all possible trees G denotes set of all metrics satisfying monotonicity property Maximization involved is formidable Brute Force method: for N = 10, more than 1.8 x 10 6 trees

Simplifying the problem Parameters  are chosen to maximize the value for a given tree T To provide the very best fit T can provide to Data Log likelihood of T Maximum Likelihood Tree is the one in the forest that has the largest likelihood value

Stochastic Search Reversible Markov Chain Monte Carlo Method Using above techniques, authors devise a rapid search method to find optimal trees. “Learning using Bayesian Statistics” Prior and Posterior distributions Main Idea: Posterior Distribution gives the region of high likelihood trees in F

Birth Move (insert node) T 1 T 2

Death Move (delete node) T 2 T 1

ns-2 Simulations source

Simulation results % Correct Number of Probes DBT MPLT

MCMC Algorithm true topologyMCMC topology Can Layer 2 branching points High speed connections can fool tomography

Summary Delay-based measurement, no need for clock synchronization MCMC algorithm to explore forest and identify maximum (penalized) likelihood tree