Network Measurement (II) Network Tomography

Size: px
Start display at page:

Download "Network Measurement (II) Network Tomography"

Transcription

1 Network Measurement (II) Network Tomography Tomography Tomography: imaging by sections or sectioning The word is derived from the Greek tomos (slice) and graphein (to write). Digital geometry processing is used to generate a 3-d image of the inside of an object from a large series of 2-d X-ray images taken around a single axis of rotation. Computed tomography (CT) A medical imaging method employing tomography Part

2 Network Tomography Network tomography: Inferring network characteristics from indirect measurements Coined by Y. Vardi in 1996; a.k.a. network inference Q: Why not direct measurement? A: Infeasible or too expensive to measure directly Two classes of tomography problems Traffic matrix estimation: infer e2e traffic demands from link load measurements Performance tomography: infer link performance from e2e performance measurements Solution technique Construct a system of linear equations Ax = b Solve the linear inverse problem Challenge: more unknowns than equations! Part Outline Tomo-gravity Infer e2e traffic demands from link loads Gravity model + tomography Passive loss inference Infer link loss from passive e2e measurement Statistical methods Part

3 References Fast, accurate computation of large-scale IP traffic matrices from link measurements, Y.Zhang, M.Roughan, N.Duffield and A.Greenberg, SIGMETRICS An information-theoretic approach to traffic matrix estimation, Y.Zhang, M.Roughan, C.Lund and D.Donoho, SIGCOMM Server-based inference of Internet performance. V.Padmanabhan, L.Qiu, and H.Wang. INFOCOM Part Tomo-gravity 3

4 Internet Service Provider Networks A large ISP network has 100s of nodes, 1000s of links, 10000s routes, and over 1 petabyte(10 15 bytes) per day C B A Part Network Engineering Under a failure, routes change Want to predict new link loads C A B Reliability analysis Predict link loads under unexpected/planned router/link failures Traffic engineering Optimize routes to minimize congestion Capacity planning Forecast future capacity requirements Part

5 Network Engineering: State of Art in 2003 Guess, tweak, and pray Guess based on experience & intuition Manually tweak things, and hope the best Disadvantages Manual process Time consuming, error prone Not very reliable Intuition may be wrong Unexpected side effects (often at the worst moment) Suboptimal performance Wastes resource, wastes time, angry customers Only works for current traffic pattern Need to repeat the exercise when traffic pattern changes Need accurate, automated, scientific tools! Part More Scientific Network Engineering? Feldmann et al Shaikh et al Tomo-gravity Fortz et al A: "Well, we don't know the topology, we don't know the traffic matrix, the routers don't automatically adapt the routes to the traffic, and we don't know how to optimize the routing configuration. But, other than that, we're all set!" [Rexford2000, Kurose2003] Part

6 Central Problem: No Traffic Matrix Traffic matrix (TM) Gives traffic volumes between origin and destination Very difficult to directly measure TMs Direct measurement [Feldmann et al. 2000] Collect flow-level data around the whole edge of the network Combine with routing data Semi-standard router feature: Netflow Cisco, Juniper, etc. Not always well supported Potential performance impact on routers Huge amount of data (500GB/day) Widely available SNMP data gives only link loads Even this data is not perfect (glitches, loss, ) Part Tomo-gravity Solution Tomo-gravity infers traffic matrices Input: SNMP link loads, topology, routing policies Advantages Today s data no special instrumentation Fast: a few seconds for AT&T Accurate: average ~11% error Scalable: hundreds of nodes Sound: has solid foundation in information theory Robust: copes easily with data loss & glitches Flexible: can incorporate more detailed measurements In daily use for AT&T IP network engineering Reliability analysis, traffic engineering, and capacity planning Part

7 Problem 1 link 1 3 route 2 link 3 b 1 x2 x3 route 3 router route 1 b b b Only measure at links link x 1 x 0 x Problem: Estimate traffic matrix (x s) from the link measurements (b s) Part Problem 1 link 1 route 2 3 link 3 b 1 x2 x3 route 3 router route 1 Only measure at links link 2 2 b = Ax Typically massively under-constrained! Part

8 Approaches Existing solutions Direct solution (Singular Value Decomposition) Gravity modeling Tomographic approach New solutions Generalized gravity modeling Tomo-gravity Part How to Validate? Simulate and compare Problems How to generate realistic traffic matrices? Danger of generating exactly what you put in Measure and compare Problems: Hard to get Netflow (detailed direct measurements) along whole edge of network If we had this, then we wouldn t need SNMP approach Actually pretty hard to match up data Is the problem in your data: SNMP, Netflow, routing, Our method Use partial, incomplete Netflow data (covering 70% edge) Part

9 Direct SVD Solution The problem is massively under-constrained Part Simple Gravity Model Motivated by Newton s Law of Gravitation Assume traffic between sites is proportional to traffic at each site x 1 b 2 b 3 x 2 b 1 b 3 x 3 b 1 b 2 Assume there is no systematic difference between traffic in different locations Only the total volume matters Could include a distance term, but locality of information is not so important in the Internet as in other networks Part

10 Simple Gravity Solution Better than direct SVD solution, but still not very accurate Part Generalized Gravity Model Internet routing is asymmetric Hot potato routing: use the closest exit point Generalized gravity model For outbound traffic, assumes proportionality on per-peer basis (as opposed to per-router) peering links access links Part

11 Generalized Gravity Solution Fairly accurate given that no link constraint is used Part Tomographic Approach Apply the link constraints 1 route 3 route 2 router 2 3 route 1 b = Ax Part

12 Tomographic Approach Under-constrained linear inverse problem Find additional constraints based on models Typical approach: use higher order statistics (e.g. EM, Bayesian) Disadvantages Complex algorithm doesn t scale Large IP networks have 100s of nodes, 10000s of routes Relying on higher order statistics is not robust given the problems in SNMP data Artifacts, missing data Violations of model assumptions (e.g. non-stationarity) Relatively low sampling frequency: 1 sample every 5 min Unevenly spaced sample points Not very accurate at least on simulated TM [Medina et al. 2002] Part Our Solution: Tomo-gravity Tomo-gravity = tomo-graphy + gravity modeling Reduce problem size Exploit topological equivalence Find a solution, which satisfies the constraints, and is closest to the generalized gravity model solution tomo-gravity solution (x) generalized gravity solution (g) constraint subspace (b=ax) (from link measurements) Part

13 Closest? Least-squares 2 minimize x g p Weighted least-squares minimize x[p] g[p] p Square-root weights x[p] g[p] 2 w[p] w[p] 2 2 g[p] work best tomo-gravity solution (x) generalized gravity solution (g) constraint subspace (b=ax) (from link measurements) Part Foundation in Information Theory Mutual Information I(S,D) Information gained about source (S) from destination (D) I(S,D) = -(relative entropy with respect to independent S and D) Also given by Kullback-Leibler divergence from independence Minimum mutual information Minimize I(S,D) (subject to link load constraints b=ax) Why this criterion? In the absence of information, let s assume no information Minimal assumption about the traffic Large aggregates tend to behave like overall network? Framework for tomo-gravity Gravity model = independence (between S and D) Generalized gravity model = conditional independence Weighted least-squares = first-order approx. to K-L divergence x[p] x[p] K(x g) x[p] log x[p] 1 p p g[p] g[p] p x[p] x[p] 1 g[p] p x[p] g[p] p x[p] g[p] g[p] 2 Part

14 Tomo-gravity Solution Accurate: ±20% bounds for large flows; average ~11% error Fast: less than 5 seconds for entire AT&T backbone Part Distribution of Element Sizes Estimated and actual distribution overlap Part

15 Estimates over Time Consistent performance over time Part Robustness measured link load = real load + real load N(0, ) Reasonably accurate even when noise 0.1 Part

16 Additional Information: Netflow Detailed direct measurements at a few high-traffic locations can significantly improve accuracy Part Additional Information: Local Matrices for reference previous case Local matrices also significantly improve accuracy Part

17 Network Engineering: A New Paradigm Measure, model, and control As opposed to guess, tweak, and pray what if? user input TMs routing optimizer answers, suggested changes tomo-gravity topology, routing SNMP measurement topology routing network simulator Part Operational Experience Network reliability analysis Consider link loads under planned/unexpected failures Answers what if type questions about link/span/ router failures Allows comprehensive analysis of network risks What is the link most under threat of overload under likely failure scenarios Used daily by AT&T for Planned Cable Intrusions Part

18 Operational Experience Traffic engineering Used with OSPF optimization [IMC 2003] Get within 6% of OSPF optimum using true TM Get within 12% of absolute best (e.g. using MPLS) Has been applied on a more limited basis, in connection with reliability analysis Successfully prevented service disruption during simultaneous failures of multiple large links Capacity planning Estimated traffic matrices have been used in backbone capacity planning since Oct Allows quantitative planning As opposed to being overly conservative and using unnecessarily large over-provisioning factors Part Summary: Tomo-gravity Works Takes the best of tomography and gravity modeling Has solid foundation in information theory Simple, and quick: A few seconds Accurate: average ~11% error Satisfies link constraints (gravity model solutions don t) Scalable: hundreds of nodes Uses widely available SNMP data Highly robust Can work within the limitations of SNMP data Only uses first order statistics Interpolation very effective Limited scope for improvement Can easily incorporate additional constraints Follow-up work: combine Netflow with Tomo-gravity In daily use for AT&T IP network engineering Operational experience very positive Part

19 Passive Loss Inference Motivation Ethernet Web Server Diagnosis engine Why is it so slow? C&W AT&T UUNet Sprint AOL Qwest Earthlink It s so slow! Part

20 Network Diagnosis Diagnosis engine Network topology Netmon/tcpdump traces Trouble spots location Diagnosis results: Qwest access link: > Peering between UUNET and AOL: > Part Network Diagnosis (Cont.) Goal: Determine internal network characteristics using passive end-to-end measurements Primary focus: identifying lossy links Applications Trouble shooting Server selection Server placement Overlay network path construction Part

21 Previous Work Active probing to infer link loss rate multicast probes striped unicast probes Pros & cons accurate since individual loss events identified expensive because of extra probe traffic S S A B A B Part Problem Formulation server l 2 l 1 l 3 (1-l 1 )*(1-l 2 )*(1-l 4 ) = (1-p 1 ) (1-l 1 )*(1-l 2 )*(1-l 5 ) = (1-p 2 ) (1-l 1 )*(1-l 3 )*(1-l 8 ) = (1-p 5 ) clients l 4 l 5 l 6 l 7 l 8 p 1 p 2 p 3 p 4 p 5 Challenges: Under-constrained system of equations Measurement errors Part

22 3 methods 1. Random sampling 2. Linear optimization 3. Bayesian Inference using Gibbs sampling (We ll focus on the latter one) Part Random Sampling Each sample: Randomly assign loss rate to links with constrains Iterate R times and average server l 1 l 2 l 3 l 4 l 5 l 6 l 7 l 8 clients p 1 p 2 p 3 p 4 p 5 Part

23 Linear Programming Linear Equations LP Constraints i T and P j L j i P, L j log(1/(1 p )) i log(1/(1 l )) i & i Optimization Goal Part Gibbs Sampling D observed packet transmission and loss at the clients ensemble of loss rates of links in the network Goal determine the posterior distribution P( D) Approach Use Markov Chain Monte Carlo with Gibbs sampling to obtain samples from P( D) Draw conclusions based on the samples Part

24 Gibbs Sampling (Cont.) Applying Gibbs sampling to network tomography 1) Initialize link loss rates arbitrarily 2) For j = 1 : warmup for each link i _ compute P(l i D, {l i }) _ where l i is loss rate of link i, and {l i } = U ki l k 3) For j = 1 : realsamples for each link i _ compute P(l i D, {l i }) Use all the samples obtained at step 3 to approximate P( D) Part Gibbs Sampling Details P( l i where D,{ l }) P( D l L p P( l i ) j i 1 ) 1 l i jclients P( D l P( D l it (1 p j j (1 l i L L ) ) dl ) s ) j PDF for posterior distribution p i f j j Uniform prior distribution Likelihood function (assumes independence) Relationship btw link loss and path loss (assumes independence) Part

25 Performance Evaluation Simulation experiments Trace-driven validation Part Simulation Experiments Advantage: no uncertainty about link loss rate! Methodology Topologies used: randomly-generated: nodes, max degree = 5-50 real topology obtained by tracing paths to microsoft.com clients randomly-generated packet loss events at each link A fraction f of the links are good, and the rest are bad LM1: good links: 0 1%, bad links: 5 10% LM2: good links: 0 1%, bad links: 1 100% Link loss processes: Bernoulli and Gilbert Goodness metrics: Coverage: # correctly inferred lossy links False positive: # incorrectly inferred lossy links Part

26 Comparative Results Random sampling generates many false positives LP has a low cover rate (30-60%) Gibbs performs very well (80% with a 5% false positive rate) Part Random topologies Gibbs sampling for a 1000-node random topology (d = 10, f = 0.5) # links "# correctly identified lossy links" "# true lossy links" "# false positive" Confidence estimate for gibbs sampling works well and can be used to rank order the inferred lossy links. Part

27 Trace-driven Validation Validation approach Divide client traces into two: tomography and validation Tomography data set loss inference Validation set check if clients downstream of the inferred lossy links experience high loss Experimental setup Real topologies and loss traces collected from traceroute and tcpdump at microsoft.com during 12/20/2000 and 01/11/2002 Results For the small subset of inferences that could be validated, all the inferences are correct Likely candidates for lossy links: links crossing an inter-as boundary links having a large delay (e.g. transcontinental links) links that terminate at clients Part Summary Passive network tomography is feasible Gibbs sampling has high coverage (over 80%), and low false positive rate (below 5-10%) Future work: make loss inference in real time Part

28 Discussion Q: why does Gibbs sampling outperform LP? Sampling errors cause measured loss rates to differ from true loss rates Linear relationship no longer holds exactly e.g. 5 probes give limited precision in loss estimation Temporal loss variation cannot assign a single number to loss rate of a link Gibbs sampling gains robustness by working with distributions Q: is loss independence a strong assumption? Independence across packets: not a big problem paper tried Gilbert loss and get similar results Independence across links: previous work suggests that it s reasonable for the Internet Part Concluding remarks Network tomography infers quantities of interest based on indirect measurements Often pose the problem as an under-constrained linear inverse problem Research directions Dealing with under-constrainedness by leveraging structure of the problem E.g., traffic matrix has a low-rank approximation Extending tomography to non-linear inference (e.g. in wireless environment) Design of experiments: make fewest measurements that yield maximum information Part

Traffic Matrix Estimation

Traffic Matrix Estimation Traffic Matrix Estimation Matthew Roughan http://www.research.att.com/~roughan Shannon Lab Problem C Have link traffic measurements Want to know demands from source to destination

More information

Information, Gravity, and Traffic Matrices

Information, Gravity, and Traffic Matrices Information, Gravity, and Traffic Matrices Yin Zhang, Matthew Roughan, Albert Greenberg, Nick Duffield, David Donoho 1 Problem Have link traffic measurements Want to know demands from source to destination

More information

Traffic Engineering with Estimated Traffic Matrices

Traffic Engineering with Estimated Traffic Matrices Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup Yin Zhang www.research.att.com/~roughan www.research.att.com/~mthorup www.research.att.com/~yzhang Shannon Lab AT&T Research

More information

TCP Spatial-Temporal Measurement and Analysis

TCP Spatial-Temporal Measurement and Analysis TCP Spatial-Temporal Measurement and Analysis Infocom 05 E. Brosh Distributed Network Analysis (DNA) Group Columbia University G. Lubetzky-Sharon, Y. Shavitt Tel-Aviv University 1 Overview Inferring network

More information

Hot Potatoes Heat Up BGP Routing

Hot Potatoes Heat Up BGP Routing Hot Potatoes Heat Up BGP Routing Renata Teixeira Laboratoire d Informatique de Paris 6 Université Pierre et Marie Curie Amsterdam Internet Routing Architecture Verio AT&T AOL Web Server UCSD Sprint User

More information

Part 3. Measurements and Models for Traffic Engineering

Part 3. Measurements and Models for Traffic Engineering Part 3 Measurements and Models for Traffic Engineering Traffic Engineering Goal: domain-wide control & management to Satisfy performance goals Use resources efficiently Knobs: Configuration & topology:

More information

Traffic Engineering with Estimated Traffic Matrices

Traffic Engineering with Estimated Traffic Matrices Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup Yin Zhang AT&T Labs Research, 18 Park Avenue, Florham Park, NJ, 7932. roughan,mthorup,yzhang @research.att.com ABSTRACT

More information

Deriving Traffic Demands for Operational IP Networks: Methodology and Experience

Deriving Traffic Demands for Operational IP Networks: Methodology and Experience Deriving Traffic Demands for Operational IP Networks: Methodology and Experience Anja Feldmann University of Saarbrücken Albert Greenberg, Carsten Lund, Nick Reingold, Jennifer Rexford, and Fred True Internet

More information

Evaluation of Optimization Methods for Network Bottleneck Diagnosis. Alina Beygelzimer Jeff Kephart Irina Rish

Evaluation of Optimization Methods for Network Bottleneck Diagnosis. Alina Beygelzimer Jeff Kephart Irina Rish Evaluation of Optimization Methods for Network Bottleneck Diagnosis Alina Beygelzimer Jeff Kephart Irina Rish Real-time Network Performance Diagnosis Nodes in computer networks often experience performance

More information

An Information-Theoretic Approach to Traffic Matrix Estimation

An Information-Theoretic Approach to Traffic Matrix Estimation An Information-Theoretic Approach to Traffic Matrix Estimation Yin Zhang Matthew Roughan Carsten Lund David Donoho AT&T Labs Research Stanford University (yzhang,roughan,lund)@research.att.com donoho@stanford.edu

More information

Reddit Recommendation System Daniel Poon, Yu Wu, David (Qifan) Zhang CS229, Stanford University December 11 th, 2011

Reddit Recommendation System Daniel Poon, Yu Wu, David (Qifan) Zhang CS229, Stanford University December 11 th, 2011 Reddit Recommendation System Daniel Poon, Yu Wu, David (Qifan) Zhang CS229, Stanford University December 11 th, 2011 1. Introduction Reddit is one of the most popular online social news websites with millions

More information

Approximately Uniform Random Sampling in Sensor Networks

Approximately Uniform Random Sampling in Sensor Networks Approximately Uniform Random Sampling in Sensor Networks Boulat A. Bash, John W. Byers and Jeffrey Considine Motivation Data aggregation Approximations to COUNT, SUM, AVG, MEDIAN Existing work does not

More information

Shifting Network Tomography Toward A Practical Goal

Shifting Network Tomography Toward A Practical Goal École Polytechnique Fédérale de Lausanne Shifting Network Tomography Toward A Practical Goal Denisa Ghita, Can Karakus, Katerina Argyraki, Patrick Thiran CoNext 2011, Tokyo, Japan 1 The ISP Curious About

More information

Modeling and Reasoning with Bayesian Networks. Adnan Darwiche University of California Los Angeles, CA

Modeling and Reasoning with Bayesian Networks. Adnan Darwiche University of California Los Angeles, CA Modeling and Reasoning with Bayesian Networks Adnan Darwiche University of California Los Angeles, CA darwiche@cs.ucla.edu June 24, 2008 Contents Preface 1 1 Introduction 1 1.1 Automated Reasoning........................

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Joint Server Selection and Routing for Geo-Replicated Services

Joint Server Selection and Routing for Geo-Replicated Services Joint Server Selection and Routing for Geo-Replicated Services Srinivas Narayana Joe Wenjie Jiang, Jennifer Rexford and Mung Chiang Princeton University 1 Large-scale online services Search, shopping,

More information

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University of Michigan) Jennifer Rexford (Princeton University)

More information

Measurement Based Routing Strategies on Overlay Architectures

Measurement Based Routing Strategies on Overlay Architectures Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Lecture 11: Randomized Least-squares Approximation in Practice. 11 Randomized Least-squares Approximation in Practice

Lecture 11: Randomized Least-squares Approximation in Practice. 11 Randomized Least-squares Approximation in Practice Stat60/CS94: Randomized Algorithms for Matrices and Data Lecture 11-10/09/013 Lecture 11: Randomized Least-squares Approximation in Practice Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these

More information

6.829 BGP Recitation. Rob Beverly September 29, Addressing and Assignment

6.829 BGP Recitation. Rob Beverly September 29, Addressing and Assignment 6.829 BGP Recitation Rob Beverly September 29, 2006 Addressing and Assignment 1 Area-Routing Review Why does Internet Scale? Hierarchical Addressing How are addresses assigned? Classfull

More information

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Optimal Network Flow Allocation EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Problem Statement Optimal network flow allocation Find flow allocation which minimizes certain performance criterion

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol

More information

Measurements for Network Operations

Measurements for Network Operations Measurements for Network Operations Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ http://www.research.att.com/~jrex Part 1: Outline Introduction Role of measurement

More information

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic measurement goals Traffic Measurement and Analysis () SOI ASIA Lecture 22//26 Kenjiro Cho Sony Computer Science Labs, Inc. kjc@csl.sony.co.jp for operations trouble shooting diagnosis and tuning of performance,

More information

Strategies for sound Internet measurement

Strategies for sound Internet measurement Strategies for sound Internet measurement Vern Paxson IMC 2004 Paxson s disclaimer There are no new research results Some points apply to large scale systems in general Unfortunately, all strategies involve

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u

More information

I How does the formulation (5) serve the purpose of the composite parameterization

I How does the formulation (5) serve the purpose of the composite parameterization Supplemental Material to Identifying Alzheimer s Disease-Related Brain Regions from Multi-Modality Neuroimaging Data using Sparse Composite Linear Discrimination Analysis I How does the formulation (5)

More information

BGP Routing inside an AS

BGP Routing inside an AS Hot Potatoes Heat Up BGP Routing Renata Teixeira (UC San Diego) http://www-cse.ucsd.edu/~teixeira with Aman Shaikh (AT&T), Tim Griffin(Intel), and Jennifer Rexford(AT&T) 30 th NANOG Miami, Florida BGP

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

CS 229 Midterm Review

CS 229 Midterm Review CS 229 Midterm Review Course Staff Fall 2018 11/2/2018 Outline Today: SVMs Kernels Tree Ensembles EM Algorithm / Mixture Models [ Focus on building intuition, less so on solving specific problems. Ask

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga

More information

Quantifying Internet End-to-End Route Similarity

Quantifying Internet End-to-End Route Similarity Quantifying Internet End-to-End Route Similarity Ningning Hu and Peter Steenkiste Carnegie Mellon University Pittsburgh, PA 523, USA {hnn, prs}@cs.cmu.edu Abstract. Route similarity refers to the similarity

More information

Challenging the Supremacy of Traffic Matrices in Anomaly Detection

Challenging the Supremacy of Traffic Matrices in Anomaly Detection Challenging the Supremacy of Matrices in Detection ABSTRACT Augustin Soule Thomson Haakon Ringberg Princeton University Multiple network-wide anomaly detection techniques proposed in the literature define

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Missing Data. Where did it go?

Missing Data. Where did it go? Missing Data Where did it go? 1 Learning Objectives High-level discussion of some techniques Identify type of missingness Single vs Multiple Imputation My favourite technique 2 Problem Uh data are missing

More information

Reformulating the monitor placement problem: Optimal Network-wide Sampling

Reformulating the monitor placement problem: Optimal Network-wide Sampling Reformulating the monitor placement problem: Optimal Network-wide Sampling Gion-Reto Cantieni (EPFL) Gianluca Iannaconne (Intel) Chadi Barakat (INRIA Sophia Antipolis) Patrick Thiran (EPFL) Christophe

More information

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks.

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks. Networking Case Studies Datacenter Backbone Networks Enterprise Backbone Mike Freedman COS 6: Computer Networks Cellular h>p://www.cs.princeton.edu/courses/archive/spr/cos6/ Wireless Backbone Networks

More information

Gaussian Processes for Robotics. McGill COMP 765 Oct 24 th, 2017

Gaussian Processes for Robotics. McGill COMP 765 Oct 24 th, 2017 Gaussian Processes for Robotics McGill COMP 765 Oct 24 th, 2017 A robot must learn Modeling the environment is sometimes an end goal: Space exploration Disaster recovery Environmental monitoring Other

More information

Robust validation of network designs under uncertain demands and failures

Robust validation of network designs under uncertain demands and failures Robust validation of network designs under uncertain demands and failures Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani Purdue University USENIX NSDI 2017 Validating network design Network design today

More information

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T

More information

New Approaches for EEG Source Localization and Dipole Moment Estimation. Shun Chi Wu, Yuchen Yao, A. Lee Swindlehurst University of California Irvine

New Approaches for EEG Source Localization and Dipole Moment Estimation. Shun Chi Wu, Yuchen Yao, A. Lee Swindlehurst University of California Irvine New Approaches for EEG Source Localization and Dipole Moment Estimation Shun Chi Wu, Yuchen Yao, A. Lee Swindlehurst University of California Irvine Outline Motivation why EEG? Mathematical Model equivalent

More information

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ Networking Acronym Smorgasbord: 802.11, DVMRP, CBT, WFQ EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other

More information

Measurement-Based Multicast on Overlay Architecture

Measurement-Based Multicast on Overlay Architecture Measurement-Based Multicast on Overlay Architecture Students: Tuna Guven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review June 18 th, 2004 1 Outline Multi-path Multicast Routing

More information

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used. 1 4.12 Generalization In back-propagation learning, as many training examples as possible are typically used. It is hoped that the network so designed generalizes well. A network generalizes well when

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-

More information

Clustering the Internet Topology at the AS-level

Clustering the Internet Topology at the AS-level Clustering the Internet Topology at the AS-level BILL ANDREOPOULOS 1, AIJUN AN 1, XIAOGANG WANG 2 1 Department of Computer Science and Engineering, York University 2 Department of Mathematics and Statistics,

More information

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319 COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents

More information

The exam is closed book, closed notes except your one-page (two-sided) cheat sheet.

The exam is closed book, closed notes except your one-page (two-sided) cheat sheet. CS 189 Spring 2015 Introduction to Machine Learning Final You have 2 hours 50 minutes for the exam. The exam is closed book, closed notes except your one-page (two-sided) cheat sheet. No calculators or

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

NetFlow-based bandwidth estimation in IP networks

NetFlow-based bandwidth estimation in IP networks NetFlow-based bandwidth estimation in IP networks Rodrigo Alarcón-Reyes Department of Electrical and Computer Engineering McGill University March 3, 22 Outline. Introduction to NetFlow 2. Definition of

More information

2007 IST Press. Reprinted with permission.

2007 IST Press. Reprinted with permission. . 2007. Robust load balancing in wireless networks. In Proceedings of the EuroFGI Workshop on IP QoS and Traffic Control, Lisbon, Portugal, 6 7 December 2007, pages 127 134. 2007 IST Press Reprinted with

More information

Best Practices for Determining the Traffic Matrix in IP Networks

Best Practices for Determining the Traffic Matrix in IP Networks Best Practices for Determining the Traffic Matrix in IP Networks Apricot 2005 - Kyoto, Japan Thursday February 24, 2005 Internet Routing and Backbone Operations Session C5-4 Thomas Telkamp, Cariden Technologies,

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

An Introduction to Content Based Image Retrieval

An Introduction to Content Based Image Retrieval CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially

More information

Machine Learning Techniques for Data Mining

Machine Learning Techniques for Data Mining Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already

More information

On the Optimality of Link-State Routing Protocols

On the Optimality of Link-State Routing Protocols On the Optimality of Link-State Routing Protocols Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University) New Mathematical Frontiers in

More information

Efficient solutions for the monitoring of the Internet

Efficient solutions for the monitoring of the Internet Efficient solutions for the monitoring of the Internet Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group HDR defense January 22, 2009 Email: Chadi.Barakat@sophia.inria.fr WEB: http://www.inria.fr/planete/chadi

More information

Maximum Likelihood Network Topology Identification from Edge-based Unicast Measurements. About the Authors. Motivation and Main Point.

Maximum Likelihood Network Topology Identification from Edge-based Unicast Measurements. About the Authors. Motivation and Main Point. Maximum Likelihood Network Topology Identification from Edge-based Unicast Measurements Mark Coates McGill University Presented by Chunling Hu Rui Castro, Robert Nowak Rice University About the Authors

More information

Application of SDN: Load Balancing & Traffic Engineering

Application of SDN: Load Balancing & Traffic Engineering Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection

More information

Feature selection. LING 572 Fei Xia

Feature selection. LING 572 Fei Xia Feature selection LING 572 Fei Xia 1 Creating attribute-value table x 1 x 2 f 1 f 2 f K y Choose features: Define feature templates Instantiate the feature templates Dimensionality reduction: feature selection

More information

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Estimation of Message Source and Destination From Network Intercepts Derek Justice and Alfred Hero, Fellow, Abstract We consider the problem of estimating

More information

Internet Design Principles and Architecture

Internet Design Principles and Architecture Internet Design Principles and Architecture Venkat Padmanabhan Microsoft Research 2 April 2001 Venkat Padmanabhan 1 Lecture Outline A brief history of the Internet How is the Internet different from the

More information

Traffic Matrix Reloaded: Impact of Routing Changes

Traffic Matrix Reloaded: Impact of Routing Changes Traffic Matrix Reloaded: Impact of Routing Changes Renata Teixeira 1, Nick Duffield 2, Jennifer Rexford 2, and Matthew Roughan 3 1 U. California San Diego, teixeira@cs.ucsd.edu 2 AT&T Labs Research, {duffield,jrex}@research.att.com

More information

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms

More information

P257 Transform-domain Sparsity Regularization in Reconstruction of Channelized Facies

P257 Transform-domain Sparsity Regularization in Reconstruction of Channelized Facies P257 Transform-domain Sparsity Regularization in Reconstruction of Channelized Facies. azemi* (University of Alberta) & H.R. Siahkoohi (University of Tehran) SUMMARY Petrophysical reservoir properties,

More information

Practical Approach to Identifying Additive Link Metrics with Shortest Path Routing

Practical Approach to Identifying Additive Link Metrics with Shortest Path Routing Practical Approach to Identifying Additive Link Metrics with Shortest Path Routing Xiong Wang Mehdi Malboubi Sheng Wang Shizhong Xu Chen-Nee Chuah Key Lab of Optical Fiber Sensing & Communications School

More information

Generalized Network Flow Programming

Generalized Network Flow Programming Appendix C Page Generalized Network Flow Programming This chapter adapts the bounded variable primal simplex method to the generalized minimum cost flow problem. Generalized networks are far more useful

More information

Workshop - Model Calibration and Uncertainty Analysis Using PEST

Workshop - Model Calibration and Uncertainty Analysis Using PEST About PEST PEST (Parameter ESTimation) is a general-purpose, model-independent, parameter estimation and model predictive uncertainty analysis package developed by Dr. John Doherty. PEST is the most advanced

More information

Optimal network flow allocation

Optimal network flow allocation Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Learning-based Neuroimage Registration

Learning-based Neuroimage Registration Learning-based Neuroimage Registration Leonid Teverovskiy and Yanxi Liu 1 October 2004 CMU-CALD-04-108, CMU-RI-TR-04-59 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Abstract

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

Computer Vision Projective Geometry and Calibration. Pinhole cameras

Computer Vision Projective Geometry and Calibration. Pinhole cameras Computer Vision Projective Geometry and Calibration Professor Hager http://www.cs.jhu.edu/~hager Jason Corso http://www.cs.jhu.edu/~jcorso. Pinhole cameras Abstract camera model - box with a small hole

More information

Graphical Models, Bayesian Method, Sampling, and Variational Inference

Graphical Models, Bayesian Method, Sampling, and Variational Inference Graphical Models, Bayesian Method, Sampling, and Variational Inference With Application in Function MRI Analysis and Other Imaging Problems Wei Liu Scientific Computing and Imaging Institute University

More information

Orange3 Data Fusion Documentation. Biolab

Orange3 Data Fusion Documentation. Biolab Biolab Mar 07, 2018 Widgets 1 IMDb Actors 1 2 Chaining 5 3 Completion Scoring 9 4 Fusion Graph 13 5 Latent Factors 17 6 Matrix Sampler 21 7 Mean Fuser 25 8 Movie Genres 29 9 Movie Ratings 33 10 Table

More information

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Interdomain Routing Reading: Sections P&D 4.3.{3,4} Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/

More information

Computer vision: models, learning and inference. Chapter 10 Graphical Models

Computer vision: models, learning and inference. Chapter 10 Graphical Models Computer vision: models, learning and inference Chapter 10 Graphical Models Independence Two variables x 1 and x 2 are independent if their joint probability distribution factorizes as Pr(x 1, x 2 )=Pr(x

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Data Mining Chapter 8: Search and Optimization Methods Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University

Data Mining Chapter 8: Search and Optimization Methods Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Data Mining Chapter 8: Search and Optimization Methods Fall 2011 Ming Li Department of Computer Science and Technology Nanjing University Search & Optimization Search and Optimization method deals with

More information

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview Basic concepts Characterization of traffic properties that are important to measure

More information

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology

ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

Model Fitting, RANSAC. Jana Kosecka

Model Fitting, RANSAC. Jana Kosecka Model Fitting, RANSAC Jana Kosecka Fitting: Overview If we know which points belong to the line, how do we find the optimal line parameters? Least squares What if there are outliers? Robust fitting, RANSAC

More information

Revision of the SolidWorks Variable Pressure Simulation Tutorial J.E. Akin, Rice University, Mechanical Engineering. Introduction

Revision of the SolidWorks Variable Pressure Simulation Tutorial J.E. Akin, Rice University, Mechanical Engineering. Introduction Revision of the SolidWorks Variable Pressure Simulation Tutorial J.E. Akin, Rice University, Mechanical Engineering Introduction A SolidWorks simulation tutorial is just intended to illustrate where to

More information

Irradiance Gradients. Media & Occlusions

Irradiance Gradients. Media & Occlusions Irradiance Gradients in the Presence of Media & Occlusions Wojciech Jarosz in collaboration with Matthias Zwicker and Henrik Wann Jensen University of California, San Diego June 23, 2008 Wojciech Jarosz

More information

Copyright. Han Hee Song

Copyright. Han Hee Song Copyright by Han Hee Song 2006 Scalable and Flexible Network Measurement by Han Hee Song, B.S. Thesis Presented to the Faculty of the Graduate School of The University of Texas at Austin in Partial Fulfillment

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Introduction to Machine Learning CMU-10701

Introduction to Machine Learning CMU-10701 Introduction to Machine Learning CMU-10701 Clustering and EM Barnabás Póczos & Aarti Singh Contents Clustering K-means Mixture of Gaussians Expectation Maximization Variational Methods 2 Clustering 3 K-

More information

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables

More information