15-744: Computer Networking L-24 Network Measurements.

Slides:



Advertisements
Similar presentations
Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Advertisements

End to End Routing Behavior in the Internet Vern Paxson Network Research Group Lawrence Berkeley National Laboratory University of California, Berkeley.
CSE331: Introduction to Networks and Security Lecture 10 Fall 2002.
Part IV: BGP Routing Instability. March 8, BGP routing updates  Route updates at prefix level  No activity in “steady state”  Routing messages.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
End-to-End Routing Behavior in the Internet Vern Paxson Presented by Zhichun Li.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
15-441: Computer Networking Lecture 26: Networking Future.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
King : Estimating latency between arbitrary Internet end hosts Krishna Gummadi, Stefan Saroiu Steven D. Gribble University of Washington Presented by:
High-performance bulk data transfers with TCP Matei Ripeanu University of Chicago.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
A Network Measurement Architecture for Adaptive Networked Applications Mark Stemm* Randy H. Katz Computer Science Division University of California at.
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
1 End-to-End Detection of Shared Bottlenecks Sridhar Machiraju and Weidong Cui Sahara Winter Retreat 2003.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
E2E Routing Behavior in the Internet Vern Paxson Sigcomm 1996 Slides are adopted from Ion Stoica’s lecture at UCB.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
Dynamic routing – QoS routing Load sensitive routing QoS routing.
Lecture 5: Congestion Control l Challenge: how do we efficiently share network resources among billions of hosts? n Last time: TCP n This time: Alternative.
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
Estimating Congestion in TCP Traffic Stephan Bohacek and Boris Rozovskii University of Southern California Objective: Develop stochastic model of TCP Necessary.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
CS 268: Lecture 18 Measurement Studies on Internet Routing Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
15-744: Computer Networking L-20 Network Measurements.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
Traffic Modeling.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Adaptive Failover Mechanism Motivation End-to-end connectivity can suffer during net failures Internet path outage detection and recovery is slow (shown.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Estimating Bandwidth of Mobile Users Sept 2003 Rohit Kapoor CSD, UCLA.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
U Innsbruck Informatik - 1 CADPC/PTP in a nutshell Michael Welzl
1 Seminar / Summer Semester 2000 Internet Connectivity Christian A. Plattner,
CS551: End-to-End Packet Dynamics Paxon’99 Christos Papadopoulos (
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Opportunistic Traffic Scheduling Over Multiple Network Path Coskun Cetinkaya and Edward Knightly.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Lecture 9 – More TCP & Congestion Control
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Computer Networking Lecture 18 – More TCP & Congestion Control.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
End-to-End Routing Behavior in the Internet Vern Paxson Presented by Sankalp Kohli and Patrick Wong.
1 CS 268: Lecture 14 Internet Measurements Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Network Devices and Firewalls Lesson 14. It applies to our class…
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Lecture 13 – Network Mapping
Magda El Zarki Professor, ICS UC, Irvine
Lecture 19 – TCP Performance
Network Core and QoS.
CPSC 641: Network Traffic Self-Similarity
Network Core and QoS.
Presentation transcript:

15-744: Computer Networking L-24 Network Measurements

L -24; © Srinivasan Seshan, Network Measurements How is the Internet holding up? Assigned reading [Pax97] End-to-End Internet Packet Dynamics

L -24; © Srinivasan Seshan, Motivation Answers many questions How does the Internet really operate? Is it working efficiently? How will trends affect its operation? How should future protocols be designed? Aren’t simulation and analysis enough? We really don’t know what to simulate or analyze Need to understand how Internet is being used! Too difficult to analyze or simulate parts we do understand

L -24; © Srinivasan Seshan, Measurement Methodologies Active tests – probe the network and see how it responds Must be careful to ensure that your probes only measure desired information (and without bias) Labovitz routing behavior – add and withdraw routes and see how BGP behaves Paxson packet dynamics – perform transfers and record behavior Bolot delay & loss – record behavior of UDP probes Passive tests – measure existing behavior Must be careful not to perturb network Labovitz BGP anamolies – record all BGP exchanges Paxson routing behavior – perform traceroute between hosts Lelan self-similarity – record ethernet traffic

L -24; © Srinivasan Seshan, Traces Characteristics Some available at E.g. tcpdump files and HTTP logs Public ones tend to be old (2+ years) Privacy concerns tend to reduce useful content Paxson’s test data Network Probe Daemon (NPD) – performs transfers & traceroutes, records packet traces Approximately sites participated in various NPD based studies The number of “paths” tested by NPD framework scaled with (number of hosts) hosts = paths!

L -24; © Srinivasan Seshan, Observations – Routing Pathologies Observations from traceroute between NPDs Routing loops Types – forwarding loops, control information loop (count-to-infinity) and traceroute loop (can be either forwarding loop or route change) Routing protocols should prevent loops from persisting Fall into short-term ( 12 hrs) duration Some loops spanned multiple BGP hops!  seem to be a result of static routes Erroneous routing – Rare but saw a US-UK route that went through Isreal  can’t really trust where packets may go!

L -24; © Srinivasan Seshan, Observations – Routing Pathologies Route change between traceroutes Associated outages have bimodal duration distribution Perhaps due to the difference in addition/removal of link in routing protocols Temporary outages Traceroute probes (1-2%) experienced > 30sec outages Outage likelihood strongly correlated with time of day/load Most pathologies seem to be getting worse over time

L -24; © Srinivasan Seshan, Observations – Routing Stability Prevalence – how likely are you to encounter a given route In general, paths have a single primary route For 50% of paths, single route was present 82% of the time Persistence – how long does a given route last Hard to measure – what if route changes and changes back between samples? Look at 3 different time scales Seconds/minutes  load-balancing flutter & tightly coupled routers 10’s of Minutes  infrequently observed Hours  2/3 of all routes, long lived routes typically lasted several days

L -24; © Srinivasan Seshan, Observations – Re-ordering 12-36% of transfers had re-ordering 1-2% of packets were re-ordered Very much dependent on path Some sites had large amount of re-ordering Forward and reverse path may have different amounts Impact  ordering used to detect loss TCP uses re-order of 3 packets as heuristic Decrease in threshold would cause many “bad” rexmits But would increase rexmit opportunities by 65-70% A combination of delay and lower threshold would be satisfactory though  maybe Vegas would work well!

L -24; © Srinivasan Seshan, Observations – Packet Oddities Replication Internet does not provide “at most once” delivery Replication occurs rarely Possible causes  link-layer rexmits, misconfigured bridges Corruption Checksums on packets are typically weak 16-bit in TCP/UDP  miss 1/64K errors Approx. 1/5000 packets get corrupted 1/3million packets are probably accepted with errors!

L -24; © Srinivasan Seshan, Observations – Bottleneck Bandwidth Typical technique, packet pair, has several weaknesses Out-of-order delivery  pair likely used different paths Clock resolution  10msec clock and 512 byte packets limit estimate to 51.2 KBps Changes in BW Multi-channel links  packets are not queued behind each other Solution – Packet Bunch Mode (PBM) Send a group of packets and analyze modes of different bunch sizes

L -24; © Srinivasan Seshan, Observations – Loss Rates Ack losses vs. data losses TCP adapts data transmission to avoid loss No similar effect for acks  Ack losses reflect Internet loss rates more accurately (however, not a major factor in measurements) 52% of transfers had no loss (quiescent periods) 2.7% loss rate in 12/94 and 5.2% in 11/95 Loss rate for “busy” periods = 5.6 & 8.7% Losses tend to be very bursty Unconditional loss prob = 2 - 3% Conditional loss prob = % Duration of “outages” vary across many orders of magnitude (pareto distributed)

L -24; © Srinivasan Seshan, Observations – TCP Behavior Recorded every packet sent to Web server for 1996 Olympics Can re-create outgoing data based on TCP behavior  must use some heuristics to identify timeouts, etc. How is TCP used clients and how does TCP recover from losses Lots of small transfers done in parallel

L -24; © Srinivasan Seshan, Observations – TCP Behavior

L -24; © Srinivasan Seshan, Observations – Self-Similarity Let X be a sequence of values drawn from a distribution X is covariance stationary or wide-sense stationary (WSS) iff: Mean does not change with time Variance does on change with time Autocorrelation is only a function of ΔT WSS != stationary Stationary requires that all X are drawn from same distribution Basic assumption of paper is that Ethernet bandwidth is WSS

L -24; © Srinivasan Seshan, Observations – Self-Similarity A self-similar process looks similar across many different time scales Above hours, human behavior has significant effect Poisson processes tend to smooth out Suppose that original X’s were replaced by blocked version Replace m consecutive samples of X with a single average value  X (m) X is self-similar if: Variance(X (m) ) is slowly decaying as a function of m Autocorrelation of X (m) is the same as X

L -24; © Srinivasan Seshan, Observations – Self-Similarity Variance(X (m) ) is slowly decaying as a function of m Implication  process has a heavy tail since tail probabilities do not fall (I.e. large variance) Autocorrelation decays slowly Autocorrelation goes with k -B (i.e. hyperbolically) Termed long-range dependence

L -24; © Srinivasan Seshan, Observations – Self-Similarity Tests Variance-time plots For each block size m calculate variance Plot variance vs. m on log-log scale If process is self-similar, fit line and slope will be related to Hurst parameter  –2 x (1 - H) R/S statistic Calculate S 2, sample variance of X 1 …X n R = Range = max(0, W 1, W 2,…W n ) - min(0, W 1, W 2,…W n ) where W k = X 1 + X 2 … + X k – kX avg R/S should be proportional to n H then it is self-similar

L -24; © Srinivasan Seshan, Other Motivations Can also measure current state of network to provide status and short-term predictions Need on-line real-time analysis of traffic and conditions Example systems include IDMAP, Remos, Sonar, SPAND

L -24; © Srinivasan Seshan, SPAND Assumptions Geographic Stability: Performance observed by nearby clients is similar  works within a domain Amount of Sharing: Multiple clients within domain access same destinations within reasonable time period  strong locality exists Temporal Stability: Recent measurements are indicative of future performance  true for 10’s of minutes

L -24; © Srinivasan Seshan, SPAND Design Choices Measurements are shared Hosts share performance information by placing it in a per-domain repository Measurements are passive Application-to-application traffic is used to measure network performance Measurements are application-specific When possible, measure application response time, not bandwidth, latency, hop count, etc.

L -24; © Srinivasan Seshan, SPAND Architecture Data Perf. Reports Perf Query/ Response Client Packet Capture Host Client Performance Server Internet

L -24; © Srinivasan Seshan, Measurement Summary Internet is a large and heterogeneous There is no “typical” behavior  each path or region may be very different Protocols must be able to handle this Internet changes quickly New applications change the way the network is used Some invariants remain across these changes

L -24; © Srinivasan Seshan, Beginning of Semester Objectives Understand the state-of-the-art in network protocols, architectures and applications Understand how networking research is done Training network programmers vs. training network researchers

L -24; © Srinivasan Seshan, Overview (1) Fast forwarding/routing Typical structure of a router  where are the bottlenecks Challenge of doing fast route lookup/packet classification  reduce memory lookups Routing protocols Structure of the Internet Routing protocols that match administrative structure Overlay routing New approach to adding functionality to Internet Key challenge of routing at a layer above Mobile routing Routing without addressing structure (Mobile IP and ad-hoc)

L -24; © Srinivasan Seshan, Overview (2) Transport reliability Techniques for loss recovery and tradeoffs between techniques Congestion control Why is AIMD the right choice How does TCP perform cong. ctl. and resulting performance Transport alternatives Why is AIMD not always the right choice Mobile transport Why are wireless links are hard on transport Active queue managment State-of-art in no per-flow state AQM  RED & Blue Fair-queuing – how to implement and what it’s good for

L -24; © Srinivasan Seshan, Overview (3) DNS How it works and how it is used today Multicast Techniques used to make multicast IP routing possible Challenges that multicast create for upper layer protocols Reliability, congestion control, address allocation, etc. QoS How to provide guaranteed performance (Intserv) to individual flows and associated problems with scalability How to signal performance requirements to network How to provide more scalable (aggregated) service differentiation (DiffServ)

L -24; © Srinivasan Seshan, Overview (4) Different forms of network applications HTTP – how usage patterns can impact design CDNs – how to create scalable managed services P2P – how to create scalable unmanaged services Security Weaknesses in IP architecture and how to protect them Why we need security infrastructure (firewall, certificate authorities, etc.) Measurement Why we need to do this What can we discover Design philosophy Good to revisit some of the philosophy papers and examine how they impacted design

L -24; © Srinivasan Seshan, THE END! Networking has a wide variety of interesting topic areas Hopefully you should be able to pick up any networking research paper and understand both their motivation and methodology