Download presentation
Presentation is loading. Please wait.
Published byJack Bentley Modified over 10 years ago
1
collaborators: Mark Coates, Rui Castro, Ryan King, Mike Rabbat, Yolanda Tsang, Vinay Ribeiro, Shri Sarvotham, Rolf Reidi Network Bandwidth Estimation and Tomography Rob Nowak & Rich Baraniuk UW-Madison Rice University spin.rice.edu
2
too complex to measure everywhere, all the time traffic measurements expensive (hardware, bandwidth) 1969 1993 Internet Boom
3
companies do not share data or performance information Proprietary Concerns
4
bits are bundled into packets packets go through routers queues absorb bursts of packets congestion: queues fill up, large delays, packet drops Networking 101
5
Network Measurement & Inference Internet equivalent model Path Modeling and Bandwidth Estimation Network Tomography
6
Brain Tomography unknown object statistical model measurements Maximum likelihood estimate maximize likelihood physics data prior knowledge MRF model counting & projection Poisson
7
unknown object statistical model measurements Maximum likelihood estimate maximize likelihood physics data prior knowledge Network Tomography queuing behavior routing & counting binomial / multinomial
8
Network Tomography From link-level traffic measurements, infer end-to-end traffic flow rates Vardi 96, Tebaldi & West 98 Cao, Davis, Vander Wiel, Yu 00
9
y = packet losses or delays measured at the edge A = routing matrix (graph) = packet loss probabilities or queuing delays for each link = randomness inherent traffic measurements likelihood function Network Tomography (MINC Project, Towsley-Duffield)
10
Probe packets experience similar queuing effects and may interact with each other Probing the Network probe = packet stripe cross-traffic delay
11
Network Tomography: The Basic Idea sender receivers
12
Network Tomography: The Basic Idea sender receivers
13
Maximum Likelihood Estimation via EM Suppose we were able to measure losses/delays on each link Expectation-Maximization (EM) alternates between computing expectation of unobserved internal measurements and the desired estimates of link-by-link loss/delay distributions Problem: How to compute maximum likelihood estimates of link-by-link loss/delay distributions from end-to-end measurements ?
14
Topology ID via Probe Interactions
15
we can infer that receivers 3 & 4 have a longer shared path than 3 & 5
16
Finding the Maximum Likelihood Tree Stochastic search through forest via Metropolis-Hastings
17
True topology estimated topology Internet measurement experiments UNO
18
What have we learned? Clever probing and sampling schemes reveal hidden network structure and behavior Simple inference algorithms are effective, intuitive, easy to implement, scale nicely MLE criteria are easily modified to include prior information: Bayesian or regularized MLE methods are straightforward Complex interplay between measurement/probing techniques, statistical modeling, and computational methods for optimization
19
Open Problems: Placement/Coverage How should measurement devices be deployed ? Logical graph coverage of physical topology ? Can random graph models shed some light ?
20
Open Problems: Spatio-temporal Correlation competing traffic Can we detect correlations? Can we exploit them in measurement and mapping applications? Fuse tomography and bandwidth estimation Long-range dependence of network traffic Correlations due to competing traffic flows
21
Open Problems: Detection and Localization Detecting and locating anomalous behavior rather than estimating everything EstimationHypothesis Testing How can we capitalize on conventional wisdom: most links are good and only a few are bad ?
22
Open Problems: Timing and Synchronization Hardware solutions (expensive) Software solutions (more practical) - sophisticated software clocks (Veitch 02) - crude software clocks (ICMP timestamping) and statistical averaging sender network sender monitor receiver monitor receiver How to accurately measure time ?
23
Open Problems: Network Security How can measurement and monitoring across the Internet help detect and prevent malicious activities ?
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.