Amogh Dhamdhere (CAIDA) Constantine Dovrolis (Georgia Tech) ITER: A Computational Model to Evaluate Provider and Peer Selection in the Internet Ecosystem.

Slides:



Advertisements
Similar presentations
Multihoming and Multi-path Routing
Advertisements

Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
An Agent-based Model of Interdomain Interconnection in the Internet Amogh Dhamdhere (CAIDA/UCSD) With Constantine Dovrolis (Georgia Tech) Aemen Lodhi (Georgia.
Employing Agent-based Models to study Interdomain Network Formation, Dynamics & Economics Aemen Lodhi (Georgia Tech) 1 Workshop on Internet Topology &
Price-based Resource Allocation in Wireless Ad Hoc Networks Yuan Xue, Baochun Li and Klara Nahrstedt University of Illinois at Urbana-Champaign University.
Analysis of peering strategy adoption by transit providers in the Internet Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA) Constantine Dovrolis (Georgia.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
CS 4700 / CS 5700 Network Fundamentals Lecture 16: IXPs (The Underbelly of the Internet) Revised 3/23/2015.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Ten Years in the Evolution of the Internet Ecosystem
Network Capacity Planning IACT 418 IACT 918 Corporate Network Planning.
University of Nevada, Reno Ten Years in the Evolution of the Internet Ecosystem Paper written by: Amogh Dhamdhere, Constantine Dovrolis School of Computer.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Traffic Engineering With Traditional IP Routing Protocols
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
On the Stability of Rational, Heterogeneous Interdomain Route Selection Hao Wang Yale University Joint work with Haiyong Xie, Y. Richard Yang, Avi Silberschatz,
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Amogh Dhamdhere Provider and Peer Selection in the Evolving Internet Ecosystem Committee: Dr. Constantine Dovrolis (advisor) Dr. Mostafa Ammar Dr. Nick.
New Directions and Half-Baked Ideas in Topology Modeling Ellen W. Zegura College of Computing Georgia Tech.
Particle Filtering in Network Tomography
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
NOBEL WP Szept Stockholm Game Theory in Inter-domain Routing LÓJA Krisztina - SZIGETI János - CINKLER Tibor BME TMIT Budapest,
1 Applications of Relative Importance  Why is relative importance interesting? Web Social Networks Citation Graphs Biological Data  Graphs become too.
“Attractors and Repellors: a Game Theoretic interpretation of the cycles in provider-customer relations” Advanced Workshop on Internet Topology and Economics.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Transit price negotiation: repeated game approach Sogea 23 Mai 2007 Nancy, France D.Barth, J.Cohen, L.Echabbi and C.Hamlaoui
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
TDTS21: Advanced Networking Lecture 7: Internet topology Based on slides from P. Gill and D. Choffnes Revised 2015 by N. Carlsson.
A Value-based Framework for Internet Peering Agreements Amogh Dhamdhere (CAIDA) with Constantine Dovrolis (Georgia Tech) Pierre Francois.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Interaction of Overlay Networks: Properties and Implications Joe W.J. Jiang Dah-Ming Chiu John C.S. Lui The Chinese University of Hong Kong.
Michael Schapira Yale and UC Berkeley Joint work with P. Brighten Godfrey, Aviv Zohar and Scott Shenker.
The Economics of Transit and Peering Interconnections in the Internet Amogh Dhamdhere (CAIDA/UCSD) With Constantine Dovrolis (Georgia Tech)
Can ISPs be Profitable Without Violating Network Neutrality? Amogh Dhamdhere Constantine Dovrolis Georgia Tech.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
CSE534- Fundamentals of Computer Networking Lecture 12-13: Internet Connectivity + IXPs (The Underbelly of the Internet) Based on slides by D. Choffnes.
Analysis of peering strategy adoption by transit providers in the Internet Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA) Constantine Dovrolis (Georgia.
ISP and Egress Path Selection for Multihomed Networks Amogh Dhamdhere, Constantine Dovrolis Networking and Telecommunications Group Georgia Institute of.
GLOBECOM 2007 Exit Policy Violations in Multi-hop Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College.
Employing Agent-based Models to study Interdomain Network Formation, Dynamics & Economics Aemen Lodhi (Georgia Tech) 1 Workshop on Internet Topology &
Dynamic Network Analysis Case study of PageRank-based Rewiring Narjès Bellamine-BenSaoud Galen Wilkerson 2 nd Second Annual French Complex Systems Summer.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
No Direction Home: The True cost of Routing Around Decoys
ISP and Egress Path Selection for Multihomed Networks
Amogh Dhamdhere (CAIDA/UCSD) Constantine Dovrolis (Georgia Tech)
Latent Space Model for Road Networks to Predict Time-Varying Traffic
COS 561: Advanced Computer Networks
Fixing the Internet: Think Locally, Impact Globally
Authors: Jinliang Fan and Mostafa H. Ammar
Presentation transcript:

Amogh Dhamdhere (CAIDA) Constantine Dovrolis (Georgia Tech) ITER: A Computational Model to Evaluate Provider and Peer Selection in the Internet Ecosystem

Provider/peer selection strategies 10/3/ CC S SS C C P1 P2 P3 S No peering P2, P3 use traffic-ratio peering P1 open to peering with CPs

High-level questions in this research Networks rewire their connectivity (select providers and peers) to optimize an objective function (typically profit) Distributed Localized spatially and temporally What are the local implications of provider and peer selection strategies for the involved ASes? What are the global, long-term effects of these distributed optimizations for the whole Internet? Topology and traffic flow Economics Performance (path lengths) 10/3/2015 3

Our model of interdomain network formation (ITER) 10/3/ Compute the “attractors” of this dynamical system Point attractor: When no network has the incentive to change its connectivity Limit cycles: an oscillation between a number of network topologies Interdomain TM Traffic flow Interdomain topology Per-AS profit Cost/price parameters Routing Provider selection Peer selection

Approach What is the outcome when networks use certain provider and peer selection strategies? Model the Internet ecosystem as a dynamic system Real-world economics of transit, peering, operational costs Realistic routing policies Geographical constraints Provider and peer selection strategies Compute attractors Point attractors or limit cycles Measure properties of the steady-state Topology, traffic flow, economics 10/3/2015 5

Network Types Enterprise Customers (EC) Stub networks at the edge (e.g. Georgia Tech) Either sources or sinks Small Transit Providers (STP) Provide Internet transit Mostly regional in presence (e.g. France Telecom) Large Transit Providers (LTP) Transit providers with global presence (e.g. AT&T) Content Providers (CP) Major sources of content (e.g. Google) 10/3/ Provider and peer selection for STPs and LTPs

What would happen if..? The traffic matrix consists of mostly P2P traffic? P2P traffic benefits STPs, can make LTPs unprofitable LTPs peer with content providers? LTPs could harm STP profitability, at the expense of longer end-to-end paths Edge networks choose providers using path lengths? LTPs would be profitable and end-to-end paths shorter 10/3/2015 7

Provider and Peer Selection Provider selection strategies Minimize monetary cost (PR) Minimize AS path lengths weighted by traffic (PF) Avoid selecting competitors as providers (SEL) Peer selection strategies Peer only if necessary to maintain reachability (NC) Peer if traffic ratios are balanced (TR) Peer by cost-benefit analysis (CB) Peer and provider selection are related 10/3/2015 8

Provider and Peer Selection are Related 10/3/ A A C C B B U U B B U U A A C C Peering by necessity Level3-Cogent peering dispute Restrictive peering A A C C B B ?X

Economics, Routing and Traffic Matrix Realistic transit, peering and operational costs Transit prices based on data from Norton Economies of scale BGP-like routing policies No-valley, prefer customer, prefer peer routing policy Traffic matrix Heavy-tailed content popularity and consumption by sinks Predominantly client-server: Traffic from CPs to ECs Predominantly peer-to-peer: Traffic between ECs 10/3/

Algorithm for network actions Networks perform their actions sequentially Can observe the actions of previous networks And the effects of those actions Network actions in each move Pick set of preferred providers Attempt to convert provider links to peering links “due to necessity” Evaluate each existing peering link Evaluate new peering links Networks make at most one change to their set of peers in a single move 10/3/

Solving the Model Determine the outcome as each network selects providers and peers according to its strategy Too complex to solve analytically: Solve computationally Typical computation Proceeds iteratively, networks act in a predefined sequence Pick next node n to “play” its possible moves Compute routing, traffic flow, AS fitness Repeat until no player has incentive to move (point attractor) Or until we have detected a limit cycle 10/3/

Properties of the steady-state Do we always reach a point attractor? Yes, in most cases (but see paper for some cases of limit cycles) Is point attractor unique? No, it can depend on playing sequence and initial conditions But, different attractors have statistically similar properties Multiple runs with different playing sequences Average over different runs Confidence intervals are narrow 10/3/

Canonical Model Parameterization of the model that resembles real world Traffic matrix is predominantly client-server (80%) Impact of streaming video, centralized file sharing services 20% of ECs are content sources, 80% sinks Heavy tailed popularity of traffic sources Edge networks choose providers based on price 5 geographical regions STPs cheaper than LTPs 10/3/

Results – Canonical Model 10/3/ EC LTP S1 S2 CP EC Hierarchy of STPs Traffic can bypass LTPs – LTPs unprofitable STPs should not peer with CPs CPs choose STPs as providers

Results – Canonical Model 10/3/ LTP S1 S2 CP EC What-if: LTPs peer with CPs Generate revenue from downstream traffic Can harm STP fitness Long paths

Deviation 1: P2P Traffic matrix 10/3/ LTP S1 S2 CP EC P2P traffic helps STPs Smaller traffic volume from CPs to Ecs More EC-EC traffic => balanced traffic ratios More opportunities for STPs to peer LTP S1 S2 EC S3 EC

Peering Federation Traditional peering links: Not transitive Peering federation of A, B, C: Allows mutual transit Longer chain of “free” traffic Incentives to join peering federation? What happens to tier-1 providers if smaller providers form federations? 10/3/ A A B B C C

Conclusions A model that captures the feedback loop between topology, traffic and fitness in the Internet Considers effects of Economics Geography Heterogeneity in network types Predict the effects of provider and peer selection strategies Topology, traffic flow, economics, and performance 10/3/

Model Validation Reproduces almost constant average path length Activity frequency: How often do networks change their connectivity? ECs less active than providers – Qualitatively similar to measurement results 10/3/

Previous Work Static graph properties No focus on how the graph evolves “Descriptive” modeling Match graph properties e.g. degree distribution Homogeneity Nodes and links all the same Game theoretic, computational Restrictive assumptions Dynamics of the evolving graph Birth/death Rewiring “Bottom-up” Model the actions of individual networks Heterogeneity Networks with different incentives Semantics of interdomain links 10/3/