Packet Doppler: Network Monitoring using Packet Shift Detection

Similar documents
Basics (cont.) Characteristics of data communication technologies OSI-Model

Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Accurate and Efficient SLA Compliance Monitoring

Improving VoD System Efficiency with Multicast and Caching

Analytical Modeling of Parallel Systems. To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003.

Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture

Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen

Network Data Streaming A Computer Scientist s Journey in Signal Processing

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing

Pricing Intra-Datacenter Networks with

Maximum Likelihood Network Topology Identification from Edge-based Unicast Measurements. About the Authors. Motivation and Main Point.

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Origin- des*na*on Flow Measurement in High- Speed Networks

Pictorial Structures for Object Recognition

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

Mean Value Analysis and Related Techniques

SELECTION OF METRICS (CONT) Gaia Maselli

Summary Cache based Co-operative Proxies

NetFlow-based bandwidth estimation in IP networks

Internet Path Stability: Exploring the Impact of MPLS. Zakaria Al-Qudah, PhD. Yarmouk University April 2, 2015

BATS: Achieving the Capacity of Networks with Packet Loss

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

IP SLA Service Performance Testing

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Lecture 2: Streaming Algorithms for Counting Distinct Elements

set active-probe (PfR)

An Implementation of a Soft-Input Stack Decoder For Tailbiting Convolutional Codes

Machine-Learning-Based Flow scheduling in OTSSenabled

Structured Learning. Jun Zhu

Ch. 13: Measuring Performance

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory

Statistics 202: Data Mining. c Jonathan Taylor. Outliers Based in part on slides from textbook, slides of Susan Holmes.

Origin-Destination Flow Measurement in High-Speed Networks

Lecture 8: The EM algorithm

Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs

Model-based Measurements Of Network Loss

Journal of Electronics and Communication Engineering & Technology (JECET)

Traffic: Monitoring, Estimation, and Engineering. Nick Feamster CS 7260 February 14, 2007

Comparison of Shaping and Buffering for Video Transmission

Viterbi Algorithm for error detection and correction

PROVIDING SERVICE DIFFERENTIATION IN OBS NETWORKS THROUGH PROBABILISTIC PREEMPTION. YANG LIHONG (B.ENG(Hons.), NTU)

Performance Modeling

Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

CPU Scheduling. Daniel Mosse. (Most slides are from Sherif Khattab and Silberschatz, Galvin and Gagne 2013)

Network-Adaptive Video Coding and Transmission

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Anomaly Detection in Cyber Physical Systems

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Random projection for non-gaussian mixture models

Low Latency via Redundancy

Machine Learning Basics. Sargur N. Srihari

Call Admission Control in IP networks with QoS support

6th International Workshop on OMNeT++

Lecture 9. Quality of Service in ad hoc wireless networks

Expeditus: Congestion-Aware Load Balancing in Clos Data Center Networks

Domain Based Approach for QoS Provisioning in Mobile IP

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

Performance anomaly of b

Computational Cognitive Science

Mixture Models and EM

Conditional Random Fields - A probabilistic graphical model. Yen-Chin Lee 指導老師 : 鮑興國

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

The FootFall Project Tracing Attacks Through Non-Cooperative Networks and Stepping Stones with Timing-Based Watermarking

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment

Incentive-Aware Routing in DTNs

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Efficient solutions for the monitoring of the Internet

Uncertainties: Representation and Propagation & Line Extraction from Range data

Scalable Enterprise Networks with Inexpensive Switches

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

Configuring IP SLA UDP Jitter Operations

Maximizing the Number of Users in an Interactive Video-on-Demand System

Chapter 5: Analytical Modelling of Parallel Programs

Heterogeneity Increases Multicast Capacity in Clustered Network

NEMO 3.0 Product Description NetAxis Solutions

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

434 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 2, FEBRUARY Collaborative Decoding in Bandwidth-Constrained Environments

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a

Empirical Comparisons of Fast Methods

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Impacts of Realistic Traffic on the Mapping Scheme in Locator/Identifier Separation Networks

Clustering Lecture 5: Mixture Model

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura

Load Balancing with Minimal Flow Remapping for Network Processors

CS 218- QoS Routing + CAC Fall 2003

Towards an efficient Service Level Agreement assessment

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Transcription:

Packet Doppler: Network Monitoring using Packet Shift Detection Tongqing Qiu, Nan Hua, Jun (Jim) Xu Georgia Tech Jian Ni, Hao Wang, Richard (Yang) Yang Yale University Presenter: Richard Ma December 10th, 2008

Motivation Users demand strict guarantees from their network providers on key metrics: Stringent demand on performance monitoring Dominant type of monitoring approach is based on end-to-end probing. CoNext 2008, Madrid, SPAIN 1

The Drawbacks of End-to-end Probing Probing is overhead: reduces usable network bandwidth. Scalability issue: n edge nodes, probing n 2 pairs. Probing may cause perturbation to real traffic. The effect of perturbation can be more serious when the network load is high, the moment when it is more important to get more accurate measurements. Active probing estimates the performance of the probing traffic instead of the real traffic. Performance anomalies (e.g., bursts) between probing intervals may be missed. CoNext 2008, Madrid, SPAIN 2

Our contributions Packet Doppler, a passive monitoring methodology. Packet Doppler can estimate delay with high precision and low overhead. Packet Doppler can detect burst of delay changes. Two novel decoding methods to effectively improve decoding accuracy. CoNext 2008, Madrid, SPAIN 3

The phenomenon of packet shift ingress links i traffic time traffic egress links j time CoNext 2008, Madrid, SPAIN 4

Estimation of delay distribution node i 100 node j pdf 0.6 0.3 0 1 2 30 60 10 3 4 5 6 7 0 1 2 3 4 5 6 7 t Estimation of delay distribution from the packet shift process. CoNext 2008, Madrid, SPAIN 5

Encoding Procedure General Steps Process each packet (maximize information) Hash to one position in the bitmap b (minimize cost) Decoding Procedure: Estimate the number of packets [Wang et al. 1990] ˆn i (s) = b ln ˆm j (t) = b ln b u Ai (s) b u Dj (t) ˆx i,j (s, t) = ˆn i (s) + ˆm j (t) b ln ; ; b u Ai (s) D j (t). (1) CoNext 2008, Madrid, SPAIN 6

Limitation of Naive Decoding When the amount of traffic between i and j is small relative to the cross traffic at i and/or j, the naive decoding scheme may report imprecise delay values since the intersection estimation can be drown out by noise. Better decoding schemes are needed. Sequential Hypothesis Testing (SHT) Iterative Proportional Fitting (IPF) CoNext 2008, Madrid, SPAIN 7

A Hypothesis Testing Perspective Every possible shift can be viewed a hypothesis H. Based on the bitmap observation, we test all the hypotheses and select the most likely hypothesis as the detection result. We consider K hypotheses H 1, H 2,..., H K. We want to find the most likely hypotheses H t. Applying likelihood ratio test, we compute the likelihood ratio λ t (ˆx) for each hypothesis, and find t to maximize λ t (ˆx) λ t (ˆx) = sup Θ t L(θ t ˆx) sup Θ L(θ t ˆx). (2) CoNext 2008, Madrid, SPAIN 8

Sequential Hypothesis Testing Instead of performing hypothesis testing for each and every source interval individually, we bundle 2 or more consecutive source intervals together and perform a joint hypothesis testing on them. The hypothesis space grows exponentially with the number of intervals bundled together. near-fcfs assumption: We assume that, for any time s, the vast majority (say more than 95%) of packets in A i (s) will be delivered no later than those of A i (s + 1) by more than one unit of time. CoNext 2008, Madrid, SPAIN 9

Sequential Hypothesis Testing (cont.) state measurement interval 0 x x+1 x+2 X-1 X An example of Viterbi decoding. There are four states. The solid line represents the active path, and dash line represents an example of an invalid path. Viterbi decoding is a dynamic programming algorithm in essence. CoNext 2008, Madrid, SPAIN 10

Iterative Proportional Fitting Improve the estimation (minimize the noise) based on conservation law. The estimation noises are asymptotically Gaussian noises [Wang et al. 1990]. Conservation law: all packets coming into the network have to exit somewhere at some point in time. ˆn i (s) + ɛ i (s) = j t T ij (s) (ˆx ij (s, t) + ɛ ij (s, t)), i, s; CoNext 2008, Madrid, SPAIN 11

Iterative Proportional Fitting(cont.) The procedure: Iteratively compute the noise ɛ i (s), ɛ j (t) and ɛ ij (s, t), proportionally fitting based on variance. For example: ɛ i (s) = v i (s) ( v i (s) + j,t v ij(s, t) j,t ) ˆx ij (s, t) ˆn i (s), Then update the estimation value ˆn i (s) ˆm j (t) ˆx ij (s, t) according. We can prove that IPF will converge to the joint MLEs. CoNext 2008, Madrid, SPAIN 12

Evaluations: Experiment Setup An event-driven platform: one event occurs when there is a packet arrives at an ingress link or departs from an egress link. Delay: Delay traces collected from one source node to five PlanetLab nodes at five geographically distributed locations. Traffic demand: traffic demand traces collected from Abilene. Performance metrics: mean, variance and distribution (PDF) of delays. CoNext 2008, Madrid, SPAIN 13

Overhead Packet Doppler: Per link digest size: 2 Kb. Per link digests generated and stored per second: 2 Mb. If the SLA monitoring process is performed online, the transmission bandwidth cost is also 2 Mb/s. Network-wide storage/digest size: n * 2 Mb. Packet probing: SLAm: probing bandwidth for each pair: 80Kb/s. Network-wide bandwidth: n 2 * 80 Kb/s. Observation: The larger the network, the more benefit by Packet Doppler. CoNext 2008, Madrid, SPAIN 14

Experiment Results: mean delay and variance Destination SLAm Naive SHT SHT+IPF Node0 0.24 0. 21 0.11 0.09 Node1 0.39 0.31 0.10 0.03 Node2 0.53 0.43 0.03 0.01 Node3 1.39 1.04 0.07 0.05 Node4 2.56 1.35 0.15 0.13 Table 1: Absolute error of mean delay estimation (milliseconds) Destination SLAm Naive SHT SHT+IPF Node0 20.3% 18.2% 7.5% 4.9% Node1 54.3% 43.4% 14.6% 9.2% Node2 50.4% 50.3% 8.3% 5.1% Node3 36.5% 35.1% 3.8% 1.9% Node4 70.1% 52.2% 5.6% 2.6% Table 2: Relative error of delay variance estimation Packet Doppler (SHT+IPF) is the best to estimate the mean delay and delay variance. CoNext 2008, Madrid, SPAIN 15

Experiment Results: delay distribution 0.1 0.08 Actual Doppler 0.1 0.08 Actual SLAm 0.06 0.06 PDF PDF 0.04 0.04 0.02 0.02 0 51 52 53 54 55 delay (ms) (a) Doppler 0 51 52 53 54 55 delay (ms) (b) SLAm Packet Doppler matches the real delay distribution well. CoNext 2008, Madrid, SPAIN 16

Experiment Results: burst detection 60 50 Actual Doppler SLAm 100 80 Actual Doppler SLAm Delay (ms) 40 30 Delay (ms) 60 40 20 20 10 3000 3050 3100 3150 3200 3250 3300 Time (ms) (c) 0 8300 8350 8400 8450 8500 8550 8600 Time (ms) (d) Take two short periods for example, Packet Doppler can detect more bursts. CoNext 2008, Madrid, SPAIN 17

Summary In this paper, we propose Packet Doppler as a scheme to monitor delay distribution, a key service level agreement metric. Packet Doppler is passive and thus do not cause perturbation to real traffic. It is also scalable with low storage and bandwidth overhead. Evaluations using realistic delay and traffic demands show that Packet Doppler achieves high accuracy and can detect burst events that may be undetected by probing based schemes. Future work: Extend to packet loss. CoNext 2008, Madrid, SPAIN 18

Thank you! Questions? CoNext 2008, Madrid, SPAIN 19