On Selfish Routing In Internet-like Environments Lili Qiu Microsoft Research Feb. 13, 2004 Johns Hopkins University.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance
Advertisements

CONFIDENTIAL © 2004 Procket Networks, Inc. All rights reserved. 4-Feb-14 The 21 st Century Intelligent Network Tony Li, Carl DeSousa.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Predictable Performance Optimization for Wireless Networks Lili Qiu University of Texas at Austin Joint work with Yi Li, Yin Zhang,
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Interference Considerations for QoS in MANETs Rajarshi Gupta, John Musacchio, Jean Walrand {guptar, musacchj, University of California,
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
Traffic Engineering With Traditional IP Routing Protocols
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
NetQuest: A Flexible Framework for Internet Measurement Lili Qiu Joint work with Mike Dahlin, Harrick Vin, and Yin Zhang UT Austin.
1 Traffic Engineering for ISP Networks Jennifer Rexford IP Network Management and Performance AT&T Labs - Research; Florham Park, NJ
Achieving End-to-End Fairness in Wireless Networks Ananth Rao Ion Stoica OASIS Retreat, Jul 2005.
Optimizing Cost and Performance for Multihoming ACM SIGCOMM 2004 Lili Qiu Microsoft Research Joint Work with D. K. Goldenberg, H. Xie,
Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol Jiayue He Princeton University Joint work with Martin Suchara,
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
1 Quantifying Trade-Offs in Networks and Auctions Tim Roughgarden Stanford University.
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
NOBEL WP Szept Stockholm Game Theory in Inter-domain Routing LÓJA Krisztina - SZIGETI János - CINKLER Tibor BME TMIT Budapest,
Network Aware Resource Allocation in Distributed Clouds.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Baruch Awerbuch, David Holmer, Herbert Rubens Szikszay Fábri Anna, ELTE IK Prog.terv.mat.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Role of incentives in networks CS 653, Fall 2010.
Jason Ernst, University of Guelph 1.  Introduction ◦ Background Information ◦ Motivation for Research / Current Problems  Proposed Solution ◦ Algorithm.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Interaction of Overlay Networks: Properties and Implications Joe W.J. Jiang Dah-Ming Chiu John C.S. Lui The Chinese University of Hong Kong.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Opportunistic Traffic Scheduling Over Multiple Network Path Coskun Cetinkaya and Edward Knightly.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
1 Measuring and Modeling the Impact of Wireless Interference Lili Qiu UT Austin Rice University Nov. 21, 2005.
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
System & Network Reading Group On Selfish Routing In Internet-Like Evironments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
System & Network Reading Group On Selfish Routing In Internet-Like Evironments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Impact of Interference on Multi-hop Wireless Network Performance
Presented by Tae-Seok Kim
ECE 544: Traffic engineering (supplement)
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Distributed Channel Assignment in Multi-Radio Mesh Networks
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Kevin Lee & Adam Piechowicz 10/10/2009
Backbone Traffic Engineering
Horizon: Balancing TCP over multiple paths in wireless mesh networks
Presentation transcript:

On Selfish Routing In Internet-like Environments Lili Qiu Microsoft Research Feb. 13, 2004 Johns Hopkins University

Today’s Internet Routing Network in charge of routing Route selection affects user performance IP routing yields sub-optimal user performance JHU MSNBC

Deficiency in IP Routing IP routing is sub-optimal for user performance –Routing hierarchy –Policy routing –Equipment failure and transient instability –Slow reaction (if any) to network congestion

Selfish Routing Selfish routing: users pick their own routes –Source routing (e.g., Nimrod) –Overlay routing (e.g., Detour, RON)

Source Routing JHU MSNBC

Overlay Routing MSNBC St. Louis JHU Salt Lake Boston Phoenix

Selfish Routing Selfish nature –End hosts or routing overlays greedily select routes –Optimize their own performance goals –Not considering system-wide criteria Studies based on small scale deployment show it improves performance How well selfish routing performs if everyone uses it?

Bad News Selfish routing can seriously degrade performance [Roughgarden & Tardos] SD L 0 (x) = x n L 1 (y) = 1 Total load: x + y = 1 Mean latency: x L 0 (x) + y L 1 (y) Worst-case ratio is unbounded - Selfish source routing All traffic through lower link  Mean latency = 1 –Latency optimal routing To minimize mean latency, set x = [1/(n+1)] 1/n  Mean latency  0 as n  

Questions Selfish source routing –How does selfish source routing perform? –Are Internet environments among the worst cases? Selfish overlay routing –How does selfish overlay routing perform? –Does the reduced flexibility avoid the bad cases? Horizontal interactions –Does selfish traffic coexist well with other traffic? –Do selfish overlays coexist well with each other? Vertical interactions –Does selfish routing interact well with network traffic engineering?

Our Approach Game-theoretic approach with simulations –Equilibrium behavior Apply game theory to compute traffic equilibria Compare with global optima and default IP routing –Intra-domain environments Compare against theoretical worst-case results Realistic topologies, traffic demands, and latency functions Disclaimers –Lots of simplifications & assumptions Necessary to limit the parameter space –Raise more questions than what we answer Lots of ongoing and future work

Routing Schemes Routing on the physical network –Source routing –Latency optimal routing Routing on an overlay (less flexible!) –Overlay source routing –Overlay latency optimal routing Compliant (i.e. default) routing: OSPF –Hop count, i.e. unit weight –Optimized weights, i.e. [FRT02] –Random weights

Internet-like Environments Network topologies –Real tier-1 ISP, Rocketfuel, random power-law graphs Logical overlay topology –Fully connected mesh (i.e. clique) Traffic demands –Real and synthetic traffic demands Link latency functions –Queuing: M/M/1, M/D/1, P/M/1, P/D/1, and BPR –Propagation: fiber length or geographical distance Performance metrics –User: Average latency –System: Max link utilization, network cost [FRT02]

Source Routing: Average Latency Good news: Internet-like environments are far from the worst cases for selfish source routing

Bad News Selfish routing can seriously degrade performance [Roughgarden & Tardos] SD L 0 (x) = x n L 1 (y) = 1 Total load: x + y = 1 Mean latency: x L 0 (x) + y L 1 (y) Worst-case ratio is unbounded - Selfish source routing All traffic through lower link  Mean latency = 1 –Latency optimal routing To minimize mean latency, set x = [1/(n+1)] 1/n  Mean latency  0 as n  

Source Routing: Network Cost Bad news: Low latency comes at much higher network cost

Selfish Overlay Routing: Full Overlay Coverage Overlay source routing perform similarly as source routing (except for very bad weight settings)

Selfish Overlay Routing: Partial Overlay Coverage (only edge nodes) The effects of partial overlay coverage is insignificant in backbone topologies.

Horizontal Interactions (Two Overlays) Different routing schemes coexist well without hurting each other.

Horizontal Interactions (Two Overlays) (Cont.) With bad weights, selfish overlay improves the performance of compliant traffic as well as its own.

Horizontal Interactions (Many Overlays) Performance degradation due to competition among overlays is insignificant.

An iterative process between two players –Traffic engineering: minimize network cost current traffic pattern  new routing matrix –Selfish overlays: minimize user latency current routing matrix  new traffic pattern Question: –Does system reach a state with both low latency and low network cost? Short answer: –Depends on how much control the network has Vertical Interactions

OSPF optimizer interacts poorly with selfish overlays because it only has very coarse-grained control. Selfish Overlays vs. OSPF Optimizer

Selfish Overlays vs. MPLS Optimizer MPLS optimizer interacts with selfish overlays much more effectively.

Summary Contributions –Important questions on selfish routing –Simulations that partially answer questions Main findings on selfish routing –Near-optimal latency in Internet-like environments In sharp contrast with the theoretical worst cases –Coexists well with other overlays & regular IP traffic Background traffic may even benefit in some cases –Big interactions with network traffic engineering Tension between optimizing user latency vs. network load

Other Work Internet –Web performance –Network measurement/tomography –Congestion control –IP telephony Wireless networks –Model the impact of wireless interference –Provision wireless networks –Manage wireless networks

Model the Impact of Wireless Interference Impact of Interference on Multihop Wireless Network Performance. ACM MOBICOM (Joint work with K. Jain, J. Padhye, and V. N. Padmanabhan)

Motivation Multihop wireless networks –Community networks, sensor networks, military applications Important to compute wireless network capacity –Capacity planning –Evaluating the efficiency of routing protocols A lot of research on capacity of multi-hop wireless networks Much of previous work studies asymptotic performance bounds –Gupta and Kumar 2000: O(1/sqrt(N)) We present a framework to answer questions about capacity of specific topologies with specific traffic patterns

Community Networking Scenario Asymptotic analysis is not useful in this case What is the maximum possible throughput?

Challenges Model the impact of wireless interference 1 Mbps Throughput = 1 Mbps Throughput = 0.5 Mbps A B BA C C

Overview of Our Framework 1.Model the problem as a standard network flow problem 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput

Advantages of Our Approach “ Real” numbers instead of asymptotic bounds Optimal bound, may not be achieved in practice Useful for “what if” analysis Permits several generalizations: Different routing single path or multi-path routing Different wireless interference models Different antennas/radios directional or unidirectional, different ranges, data rates, multiple radios/channels Different senders senders with limited (but constant) demand Different topologies Different performance metrics throughput, fairness, revenue

Sample Results Using Our Framework Houses talk to immediate neighbors, all links are capacity 1, like MAC, Multipath routing

Sample Results Using Our Framework (Cont.) ScenarioAggregate Throughput Baseline0.5 Double range0.5 Two ITAPs1 Two Radios1 Houses talk to immediate neighbors, all links are capacity 1, like MAC, Multipath routing

Future Work Trends –Networks become larger and more heterogeneous Research problems –Internet management End-user based approach in fault diagnosis –Wireless network management Error-prone physical medium Dynamic and unpredictable networks Accessible physical medium, vulnerable to attacks

Future Work (Cont.) Trends –Network protocols become more complicated, e.g., various optimizations are proposed for different network layers –Network users and providers have different and sometimes conflicting goals Research problems –How to optimize network performance? Cross different network layers Satisfy the need of different users and network providers

Thank you!

Computing Traffic Equilibrium of Selfish Routing Computing traffic equilibrium of source routing traffic –Use the linear approximation algorithm A variant of the Frank-Wolfe algorithm, which is a gradient-based line search algorithm Computing traffic equilibrium of overlay routing –Construct a logical overlay network –Use Jacob's relaxation algorithm on top of Sheffi's diagonalization method for asymmetric logical networks –Use modified linear approximation algo. in symmetric case Computing traffic equilibrium of multiple overlays –Use a relaxation framework Each overlay computes its best response by fixing the other overlays’ traffic Merge the best response and the previous state using decreasing relaxation factors.

Selfish Overlay Routing Similar results apply –Selfish overlay routing achieves close to optimal average latency –Low latency comes at higher network cost The results apply when the overlay only covers a fraction of nodes –Scenarios tested: Random coverage: % nodes Edge coverage: edge nodes only