Author: Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, Ion Stoica Presenter :Yinzhi Cao.

Slides:



Advertisements
Similar presentations
Sherlock – Diagnosing Problems in the Enterprise Srikanth Kandula Victor Bahl, Ranveer Chandra, Albert Greenberg, David Maltz, Ming Zhang.
Advertisements

Variational Methods for Graphical Models Micheal I. Jordan Zoubin Ghahramani Tommi S. Jaakkola Lawrence K. Saul Presented by: Afsaneh Shirazi.
PROVENANCE FOR THE CLOUD (USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES(FAST `10)) Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer Harvard.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Rake: Semantics Assisted Network- based Tracing Framework Yao Zhao (Bell Labs), Yinzhi Cao, Yan Chen, Ming Zhang (MSR) and Anup Goyal (Yahoo! Inc.) Presenter:
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
GEOG 111 & 211A Transportation Planning Traffic Assignment.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies Defense by Chen, Jiazhen & Chen, Shiqi.
Approximating Sensor Network Queries Using In-Network Summaries Alexandra Meliou Carlos Guestrin Joseph Hellerstein.
UNIVERSITY OF JYVÄSKYLÄ Yevgeniy Ivanchenko Yevgeniy Ivanchenko University of Jyväskylä
3D Position Determination Hasti AhleHagh Professor. W.R. Michalson.
1 On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Author: Bo Zhang T. S. Eugene Ng Publisher: IEEE INFOCOM 2010 Presenter:
4/20/2006ELEC7250: Alexander 1 LOGIC SIMULATION AND FAULT DIAGNOSIS BY JINS DAVIS ALEXANDER ELEC 7250 PRESENTATION.
Algorithms in Exponential Time. Outline Backtracking Local Search Randomization: Reducing to a Polynomial-Time Case Randomization: Permuting the Evaluation.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Design of a Learning Classifier System for … … Distributed Max-Flow Algorithm Fault Detection.
Assessing the Effect of Deceptive Data in the Web of Trust Yi Hu, Brajendra Panda, and Yanjun Zuo Computer Science and Computer Engineering Department.
Detailed diagnosis in enterprise networks Srikanth Kandula, Ratul Mahajan, Patrick Verkaik (UCSD), Sharad Agarwal, Jitu Padhye, Victor Bahl.
1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Resource sharing  Assumptions  Considerations.
Presenter: Chi-Hung Lu 1. Problems Distributed applications are hard to validate Distribution of application state across many distinct execution environments.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Detection and Resolution of Anomalies in Firewall Policy Rules
 Zhichun Li  The Robust and Secure Systems group at NEC Research Labs  Northwestern University  Tsinghua University 2.
Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies Paramvir Bahl, Ranveer Chandra, Albert Greenberg, Srikanth.
Ao-Jan Su, David R. Choffnes, Fabián E. Bustamante and Aleksandar Kuzmanovic Department of EECS Northwestern University Relative Network Positioning via.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Pete Bohman Adam Kunk. What is real-time search? What do you think as a class?
A Markov Random Field Model for Term Dependencies Donald Metzler W. Bruce Croft Present by Chia-Hao Lee.
Problem Diagnosis Distributed Problem Diagnosis Sherlock X-trace.
©NEC Laboratories America 1 Huadong Liu (U. of Tennessee) Hui Zhang, Rauf Izmailov, Guofei Jiang, Xiaoqiao Meng (NEC Labs America) Presented by: Hui Zhang.
ACN: CSFQ1 CSFQ Core-Stateless Fair Queueing Presented by Nagaraj Shirali Choong-Soo Lee ACN: CSFQ1.
1 A Dynamical Redirection Approach to Enhancing Mobile IP with Fault Tolerance in Cellular Systems Jenn-Wei Lin, Jichiang Tsai, and Chin-Yu Huang IEEE.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
Nordic Process Control Workshop, Porsgrunn, Norway Application of the Enhanced Dynamic Causal Digraph Method on a Three-layer Board Machine Cheng.
Auto Diagnosing: An Intelligent Assessment System Based on Bayesian Networks IEEE 2007 Frontiers In Education Conference- Global Engineering : Knowledge.
Harvesting Social Knowledge from Folksonomies Harris Wu, Mohammad Zubair, Kurt Maly, Harvesting social knowledge from folksonomies, Proceedings of the.
Analyzing wireless sensor network data under suppression and failure in transmission Alan E. Gelfand Institute of Statistics and Decision Sciences Duke.
Tractable Inference for Complex Stochastic Processes X. Boyen & D. Koller Presented by Shiau Hong Lim Partially based on slides by Boyen & Koller at UAI.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Change Is Hard: Adapting Dependency Graph Models For Unified Diagnosis in Wired/Wireless Networks Lenin Ravindranath, Victor Bahl, Ranveer Chandra, David.
You there? Yes Network Health Monitoring Heartbeats are sent to monitor health status of network interfaces Are sent over all cluster.
NetQuest: A Flexible Framework for Large-Scale Network Measurement Lili Qiu University of Texas at Austin Joint work with Han Hee Song.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Refined Online Citation Matching and Adaptive Canonical Metadata Construction CSE 598B Course Project Report Huajing Li.
“Niche Work” Graham J Wills, Lucent Technologies (Bell Lab)
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Probabilistic Approaches to Phylogenies BMI/CS 576 Sushmita Roy Oct 2 nd, 2014.
Software Engineering Testing. These slides are designed to accompany Software Engineering: A Practitioner’s Approach, 7/e (McGraw-Hill 2009). Slides copyright.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Fault Localization via Analysis of Network Dependency Victor Bahl, Ranveer Chandra, Albert Greenberg, Dave Maltz, Ming Zhang (MSR Redmond)
Auburn University
SmartGossip: A Reliable Broadcast Service for Wireless Sensor Networks
Exam Preparation Class
Minimum Spanning Tree 8/7/2018 4:26 AM
Worm Origin Identification Using Random Moonwalks
Spare Register Aware Prefetching for Graph Algorithms on GPUs
Markov Random Fields Presented by: Vladan Radosavljevic.
Kabra and DeWitt presented by Zack Ives CSE 590DB, May 11, 1998
Objective- To graph a relationship in a table.
Presentation transcript:

Author: Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, Ion Stoica Presenter :Yinzhi Cao

Outline  Background  Origin  X-Trace Vector Flowing Vector God OverHead  Usage Scenarios  Potential Problems

Background(1)  Network Diagnosis  Scenarios One (Accessing Website)

Background(2)  Scenario Two (Distributed File System)

Background(3)  Existing Method White Box X-Trace Black Box Wap5 Sherlock  Comparison of White Box and Black Box WhiteBo x BlackBo x OverheadLargeSmall Modification to ProgramYesNo Notification of ProgramNoYes AccuracyHighLow

Origin of X-Trace  How to Diagnosis a Person? 1. Radioactive Material Implies: We need a vector flowing in our body. 2. X-Ray Detector Implies: We need a collector to monitor activities. 3. Overhead Implies: There is no free lunch.

X-Trace(Vector)  Vector: X-Trace Metadata

X-Trace(Flowing Vector)  Flowing Vector Only Vectors are of no use. We make it flow and we get the info. The following is an entity we want to diagnosis.

X-Trace(Flowing Vector) Continued  Let Vectors Flow. Two Ways: pushNext() and pushDown()

X-Trace(Collector)  Like diagnosing a person, we need a god to collect all the data and reconstruct offline trees.  The question is how to?

X-Trace(Overhead)  Modification of Existing Program

X-Trace(Overhead) Continued  Influence on Current Network Flow 1. Metadata is very small which brings little additional flow to the network. 2. Reports are sent in different channels which doesn’t occupy current network flow

Usage Scenarios of X-Trace(1)  Web Request and Recursive DNS queries

Usage Scenarios of X-Trace(2)  A Web Hosting Site

Usage Scenarios of X-Trace(3)  An Overlay Network

Potential Problems Mentioned by Author  Report Loss  Managing Report Traffic  Non-Tree Request Structures  Partial Deployment  Security Consideration

We have examined White Box. So let’s come to some other approach, which may not be that accurate but may cost less overhead. First, we need some models.

Author: Victor Bahl, Ranveer Chandra, Albert Greenberg, Srikanth Kandula, David A. Maltz, Ming Zhang Presenter: Yinzhi Cao

Outline  Models Node Model Network Model Relationship Model  How to use Our Model  Algorithm Efficiency  Evaluation

Models  The main idea of this paper is to establish a model of network and use this model to diagnose.  We have three levels of Model: Node, Network and Relationship.

Node Model  Node has three status: down, up and troubled.

Network Model  Graph  What’s more? Inference Graph.

Relationship Model(1)  Noisy-Max

Backup Slides 1  First, we use the model below. The circle means with x probability the output is the input, and with 1-x probability the output is up.  Let’s use unordered pair {x,y} to represent node status. {1,1} = {1} up {0,1} troubled {0,0} = {0} down

Backup Slides 2  So the status of Child can be represented as follows. Status(Child) = |Status(Parent)Status(Parent)| means outer product. And we define |(x,y)| = = xy.

Relationship Model(2)  Selector

Relationship Model(3)  Failover

Backup Slides 3  We use definition before.  Status(Parent1)={x1,x2}, Status(Parent2)={y1,y2}.  Status(Child)={(x1+x2)x1+not(x1+x2)y1, (x1+x2)x2+not(x1+x2)y2} + means and, * means or which is skipped.

How to Use Model?  Fault Localization on the Inference Graph

Algorithm Efficiency(1)  Calculations inside Inference Graph ( noisy max relationship )  Reduce time complexity from O(3 n ) to O(n)

Algorithm Efficiency(2)  Comparison of Multiple Input and Observation  Two Methods to Use 1. Examine Data Sets with High Probability and Ignore Small Ones 2. Dynamic Programming (Reduce Redundancy)

Algorithm Efficiency(3)  Author conclude two observations using these two methods. 1. It is very likely that at any point in time only a few root-cause nodes are troubled or down. 2. Since a root-cause is assigned to be up in most assignment vectors, the evaluation of an assignment vector only requires re- evaluation of states at the descendants of rootcause nodes that are not up.

Evaluation  Inference Graph Established

Accuracy Compared with others

Time to Localize Faults

Impact of Errors in Inference Graph

Open Issues  The Node Model is very simple, which only has three status. Can we have a continuous model of it?  Can we take some stochastic process concept like Markov-Chain into this model?