Communication Systems Group (CSG) Policy-Compliant Path Diversity and Bisection Bandwidth Rowan Klöti 1, Vasileios Kotronis 1, Bernhard Ager 1, Xenofontas.

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

1 Praveen K. Muthuswamy Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute In collaboration with Koushik Kar, Aparna Gupta (RPI)
1 EP2210 Fairness Lecture material: –Bertsekas, Gallager, Data networks, 6.5 –L. Massoulie, J. Roberts, "Bandwidth sharing: objectives and algorithms,“
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
On Large-Scale Peer-to-Peer Streaming Systems with Network Coding Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1/27 Evaluating Potential Routing Diversity for Internet Failure Recovery *Chengchen Hu, + Kai Chen, + Yan Chen, *Bin Liu *Tsinghua University, + Northwestern.
MAX FLOW APPLICATIONS CS302, Spring 2013 David Kauchak.
Prof. Swarat Chaudhuri COMP 482: Design and Analysis of Algorithms Spring 2012 Lecture 19.
Resource Pooling A system exhibits complete resource pooling if it behaves as if there was a single pooled resource. The Internet has many mechanisms for.
Something We Always Wanted to Know about ASs: Relationships and Taxonomy Dmitri Krioukov X. Dimitropoulos, M. Fomenkov, B. Huffaker, Y.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Distributed Algorithms for Secure Multipath Routing
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
Maximum Flows Lecture 4: Jan 19. Network transmission Given a directed graph G A source node s A sink node t Goal: To send as much information from s.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
Path-Vector Contract Routing Hasan T. Karaoglu, Murat Yuksel University of Nevada, Reno ICC’12 NGNI, Toronto June, 2012.
Package Transportation Scheduling Albert Lee Robert Z. Lee.
1 Meeyoung Cha (KAIST) Sue Moon (KAIST) Chong-Dae Park (KAIST) Aman Shaikh (AT&T Labs – Research) IEEE INFOCOM 2005 Poster Session Positioning Relay Nodes.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Examination Committee: Dr. Poompat Saengudomlert (Chairperson) Assoc. Prof. Tapio Erke Dr. R.M.A.P. Rajatheva 1 Telecommunications FoS Asian Institute.
Examination Committee: Dr. Poompat Saengudomlert (Chairperson) Assoc. Prof. Tapio Erke Dr. R.M.A.P. Rajatheva 1 Telecommunications FoS Asian Institute.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
MAX FLOW APPLICATIONS CS302, Spring 2012 David Kauchak.
1/21 Evaluating Potential Routing Diversity for Internet Failure Recovery *Chengchen Hu, + Kai Chen, + Yan Chen, *Bin Liu *Tsinghua University, + Northwestern.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Embeddings, flow, and cuts: an introduction University of Washington James R. Lee.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 25.
ISP and Egress Path Selection for Multihomed Networks Amogh Dhamdhere, Constantine Dovrolis Networking and Telecommunications Group Georgia Institute of.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Network Analysis Maxflow. What is a Network? Directed connected graph Source node Sink (destination node) Arcs are weighted (costs) Represent a system.
1/18 Evaluating Potential Routing Diversity for Internet Failure Recovery *Chengchen Hu, + Kai Chen, + Yan Chen, *Bin Liu *Tsinghua University, + Northwestern.
Prof. Swarat Chaudhuri COMP 382: Reasoning about Algorithms Fall 2015.
Employing Agent-based Models to study Interdomain Network Formation, Dynamics & Economics Aemen Lodhi (Georgia Tech) 1 Workshop on Internet Topology &
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
CS 312: Algorithm Design & Analysis Lecture #29: Network Flow and Cuts This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
P4P: Proactive Provider Assistance for P2P Haiyong Xie Yale University.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Data Center Network Architectures
Improving Datacenter Performance and Robustness with Multipath TCP
CS590B/690B Detecting Network Interference
No Direction Home: The True cost of Routing Around Decoys
ISP and Egress Path Selection for Multihomed Networks
Multi-Core Parallel Routing
Peer-to-Peer Information Systems Week 6: Performance
Flow Networks and Bipartite Matching
Autonomous Network Alerting Systems and Programmable Networks
13 June 2013 Dave Risius Chris Wood
Towards Predictable Datacenter Networks
Presentation transcript:

Communication Systems Group (CSG) Policy-Compliant Path Diversity and Bisection Bandwidth Rowan Klöti 1, Vasileios Kotronis 1, Bernhard Ager 1, Xenofontas Dimitropoulos 2,1 1IEEE INFOCOM, April 2015, Hong Kong 1 ETH Zurich, Switzerland 2 University of Crete / FORTH, Greece Tuesday, 28 April 2015

Communication Systems Group (CSG) Assume that you are a network domain admin  How resilient is my AS-level connection to a remote AS?  What limits the path diversity between me and the remote AS?  My multi-homing degree?  The Internet topology at large?  Poor connectivity on the local/remote upstream ISPs’ side? 2IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 *Picture from: / Me The other guy

Communication Systems Group (CSG) Consider an example network topology 3IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) We can perform a min-cut between S and D 4IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) We can calculate the maximum S-D flow 5IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) We can calculate the edge-disjoint S-D paths 6IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Basic mechanism: min-cuts  Generalized problem: max-flow / min-cut  Basic theorem was proven back in 1956  Menger’s theorem  path diversity = min-cut, for unitary edge capacities  Well-known algorithms available  Well, then everything is already solved, right? 7IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Networks are governed by policies  Motivation  Security considerations  Routing optimization techniques  Financial agreements, SLAs, …  Example 1: the “valley-free” AS-level Internet  Peers, providers, customers: p2p, p2c, c2p links  Example 2: (negative) waypoint routing  Force traffic into waypoints  Avoid certain nodes/links along the way 8IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 c2p p2c p2p c2p p2c Peak

Communication Systems Group (CSG) Challenge: policies restrict path selection 9IEEE INFOCOM, April 2015, Hong Kong  Assume trivial regex policy: ( )* ( )+ ( )* Tuesday, 28 April 2015

Communication Systems Group (CSG) Challenge: policies restrict path selection 10IEEE INFOCOM, April 2015, Hong Kong  Only two edge-disjoint paths are now valid (min-cut=2) Tuesday, 28 April 2015

Communication Systems Group (CSG) Our contribution: estimating policy-compliant min-cuts  General methodology  Assumption: network policies as regular expressions  Graph transformation algorithm  Transformed graph contains only policy-compliant paths  Min-cut values should not be distorted by the transform  Min-cut calculations  Complex on original graph (no straightforward method)  Simple on transformed graph  No modification required on classic graph algorithms 11IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) How we represent graphs and policies  Network graph:  Network policy:  Valley-free example:  Graph = AS-level Internet  Policy = c2p*p2p?p2c* 12IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Core of transformation: tensor product 13IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015  Intuition: move between G nodes and NFA states concurrently  Should yield valid, policy-compliant paths

Communication Systems Group (CSG) Does this process preserve the min-cut? 14IEEE INFOCOM, April 2015, Hong Kong                        Intuition: the min-cut paths between any 2 node sets in G’ should traverse at most the same number of || edges as in G Tuesday, 28 April 2015

Communication Systems Group (CSG) Idea: properly add aggregation states 15IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Are all cases fully aggregatable? Aggregatable NFA cases  One-to-One  One-to-Many  Many-to-One  Many-to-Many Non-aggregatable NFA cases 16IEEE INFOCOM, April 2015, Hong Kong  Min-cut is inflated by a factor of 2  “Maximal biclique finding” problem Tuesday, 28 April 2015 Not a complete bipartite graph!

Communication Systems Group (CSG) Remember our initial motivation  How resilient is my AS-level connection to a remote AS?  What limits the path diversity between me and the remote AS?  My multi-homing degree?  The Internet topology at large?  Poor connectivity on the local/remote upstream ISPs’ side? 17IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 *Picture from: / Me The other guy + POLICIES!

Communication Systems Group (CSG) Example I: Policies and AS-level path diversity  Classic Valley-Free (VF) vs Multi-Peering Links (MPL)  Graph based on CAIDA’s AS relationship dataset (+/- open p2p links from PeeringDB) 18IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 c2p p2c p2p c2p p2c c2p p2c p2p c2p p2c p2p Plateau Peak

Communication Systems Group (CSG) Example II: Effect of depeering events  Simulated depeering between two tier-ones  Examined the effect on their exclusive customer cones  Valley-free  significant loss of path diversity  Multi-p2p links  negligible loss  Policy relaxation seems to be beneficial 19IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 Inter-domain policy scenario Loss in mean path diversity after depeering(%) Valley-free Open Links7.02 Multiple Peering Links Open Links0.04

Communication Systems Group (CSG) Summary and Contributions  Estimating policy-compliant min-cuts on network graphs  Network policies as regular expressions  Graph transformation algorithm  Exact values or approximations depending on NFA form  Min-cut calculations  Complex on original graph  Simple on transformed graph  No modification required on classic graph algorithms  Large variety of use cases out there  AS-level path diversity under diverse policy models  MPTCP, multipath routing, flow routing applications 20IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Questions? 21IEEE INFOCOM, April 2015, Hong Kong AS-level Internet POLICY- COMPLIANT MIN-CUTS Tuesday, 28 April 2015

Communication Systems Group (CSG) BACKUP 22IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Assume that you are a datacenter operator  How resilient is my switched topology to link failures?  What is the bisection bandwidth of my datacenter? 23IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015 Picture from: /

Communication Systems Group (CSG) Min-cuts are the answer to many more questions  What is the max feasible bandwidth for a MPTCP transfer between two of my server clusters?  What is the bisection bandwidth of my datacenter?  How resilient is my switched topology to link failures?  How much edge capacity should be depleted for a successful DDoS link-flooding attack against my network?  What limits the AS-level path diversity between my domain and another remote domain?  My multi-homing degree?  The Internet topology at large?  Poor connectivity on the local/remote upstream providers’ side? 24IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Complexity of the graph transform process  In space:  |V’| = O (|V|(|Q| + |Δ|)  |E’| = O (|Δ|(|V| + |E|)  In time:  t = O (|V||Q| + |Δ|(|V| + |E| + |Q|)) + t dec  In practice, the total running time is dominated by the min- cut calculation on the transformed graph 25IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Related Work  Tensor products  Soule et al. use tensor products in a different context (bandwidth allocation policies)  Network resilience  Research on resilient networks  Network are not simply geographical maps  Policy-compliance framework is very important  Min-cuts with policies  Connectivity discovered by RV protocols by Sobrinho et al., valley-free s-t paths/cuts  Our main contribution: graph transformation without changing classic algorithms (can also be extended for finding the shortest valid paths), generic method 26IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) Inter-domain Routing Policy NFAs 27IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015

Communication Systems Group (CSG) NFA vs DFA (With Steps MPL scenario) 28IEEE INFOCOM, April 2015, Hong KongTuesday, 28 April 2015