Difficulties in Simulating the Internet Sally Floyd, Van Paxson - - PowerPoint PPT Presentation

difficulties in simulating the internet
SMART_READER_LITE
LIVE PREVIEW

Difficulties in Simulating the Internet Sally Floyd, Van Paxson - - PowerPoint PPT Presentation

Difficulties in Simulating the Internet Sally Floyd, Van Paxson ACM/IEEE TON, 9(4) August 2001 Techniques for Networking Research Measurement V. Paxson. "End-to-end Internet packet dynamics, J. Padhye, V. Firoiu, D. Towesley,


slide-1
SLIDE 1

“Difficulties in Simulating the Internet”

Sally Floyd, Van Paxson ACM/IEEE TON, 9(4) August 2001

slide-2
SLIDE 2

Techniques for Networking Research

slide-3
SLIDE 3

Measurement

  • V. Paxson. "End-to-end Internet packet dynamics,”
  • J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP

Throughput: A Simple Model and its Empirical Validation,”

slide-4
SLIDE 4

“Reality Check”

Are our assumptions reasonable? Is our mathematical model a good estimation of the real world?

slide-5
SLIDE 5

e.g., from Paxson’s study

  • 1. packet losses are busrty
  • 2. OTT != RTT/2
slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8

Experimentation

e.g., V. Jacobson. “Congestion Control and Avoidance"

slide-9
SLIDE 9

Deal with implementation issues

Sometimes unforseen complexities (e.g. own research experience in Unreliable TCP)

slide-10
SLIDE 10

Understand the Behavior of Systems

Some systems are too complex to understand with “thought experiments” alone.

slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13

Analysis

  • D. Chiu and R. Jain, "Analysis of the increase and decrease

algorithms for congestion avoidance in computer networks,”

  • J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP

Throughput: A Simple Model and its Empirical Validation,”

slide-14
SLIDE 14

Explore with Complete Control

We can understand the basic forces that affect the system. e.g. TCP throughput is inversely propotional to √p

slide-15
SLIDE 15

Simplify complex systems

If too simplified, important behavior could be missed (TCP throughput without timeout)

slide-16
SLIDE 16

Simulation

  • K. Fall and S. Floyd, "Simulation-based comparison of

Tahoe, Reno, and SACK TCP,"

  • S. Floyd, K. Fall, "Promoting the Use of End-to-End

Congestion Control in the Internet,”

  • S. Floyd, V. Jacobson, "Random Early Detection Gateways

for Congestion Avoidance,"

slide-17
SLIDE 17

Check Correctness of Analysis

If simulation uses the same assumptions/model as the analysis, this simply verify the correctness of the mathematical derivations.

slide-18
SLIDE 18

Check Correctness of Analysis

Simulation can relax some assumptions, use more complex models, etc. to test the limits of analysis. (Real measurement/experiments still needed to check the usefulness of analysis results)

slide-19
SLIDE 19

Explore Complex Systems

Some systems are too difficult/impossible to analyzed e.g. Internet

slide-20
SLIDE 20

Helps Develop Intuition

slide-21
SLIDE 21

Measurement Experimentation Analysis Simulation

} }

Real World Abstract Model

slide-22
SLIDE 22

Why is Internet hard to simulate?

slide-23
SLIDE 23

1

Internet is diverse

slide-24
SLIDE 24

End-hosts: phones, desktops, servers, iPod, Wii

slide-25
SLIDE 25

Links: Ethernet, WiFi, Satellite, Dial-up, 3G

slide-26
SLIDE 26

Transport: TCP variants, UDP, DCCP

slide-27
SLIDE 27

Applications: games, videos, web, ftp, bittorrent

slide-28
SLIDE 28

2

Internet is huge

slide-29
SLIDE 29

3

Internet is changing

slide-30
SLIDE 30

http://www.isc.org/ds/

slide-31
SLIDE 31

http://www.dtc.umn.edu/mints/

slide-32
SLIDE 32

10 kB November 2000 62 kB June 2000 10.9 kB December 1999 5.6 kB December 1998 10.9 kB March 1998 Median File Transfer Size Time

Measurement at LBNL: Statistical property

  • f Internet changes as well.
slide-33
SLIDE 33

Why is Internet hard to simulate?

  • 1. Heterogeneous
  • 2. Huge
  • 3. Changing
slide-34
SLIDE 34

Suppose you come up with the greatest BitTorrent improvement ever..

slide-35
SLIDE 35

You want to simulate it to make sure it works before you release it (and call the press)

slide-36
SLIDE 36

What Internet topology should you use in your simulation?

How end hosts are connected? What are the properties of the links?

slide-37
SLIDE 37

Topology changes constantly Companies keep info secrets Routes may change Routes may be asymmetric

slide-38
SLIDE 38

You will need to simulate

  • ver a wide range of

connectivity and link properties

slide-39
SLIDE 39

Suppose you come up with the greatest TCP

  • ptimization ever..
slide-40
SLIDE 40

You want to know if it is fair to existing TCP versions before you write your SIGCOMM paper..

slide-41
SLIDE 41

Which TCP versions to compare with?

slide-42
SLIDE 42

Using “fingerprinting”, 831 different TCP implementations and versions are identified.

slide-43
SLIDE 43

Which to use? Which to ignore?

slide-44
SLIDE 44

What applications to run? What type of traffic to generate? Telnet? FTP? Web? BitTorrent? Skype?

slide-45
SLIDE 45

How congested should the network be?

slide-46
SLIDE 46

Example from Sally Floyd: RED vs DropTail

slide-47
SLIDE 47
slide-48
SLIDE 48
slide-49
SLIDE 49

Example from Sally Floyd: Using TFRC for VoIP

slide-50
SLIDE 50
slide-51
SLIDE 51
slide-52
SLIDE 52

We can focus our simulation

  • n dominant

technology/application today..

slide-53
SLIDE 53

TCP: NewReno SACKS OS: Windows Linux Applications: Web, FTP

slide-54
SLIDE 54

What about tomorrow?

slide-55
SLIDE 55

WiMax? Sensors? Virtual World? DCCP?

slide-56
SLIDE 56

10 years ago, you came up with a router mechanism to improve TCP Reno.. No one cares today.

slide-57
SLIDE 57

How to verify the simulator itself?

slide-58
SLIDE 58

So, how?

slide-59
SLIDE 59

Looking for Invariants

slide-60
SLIDE 60
  • 1. Diurnal Patterns
slide-61
SLIDE 61
slide-62
SLIDE 62

hour #constrained

  • --- ------------

00 139 2.5% -----------------------------------------------------X 01 144 2.6% ------------------------------------------------------X 02 146 2.6% -------------------------------------------------------X 03 140 2.5% -----------------------------------------------------X 04 119 2.1% ---------------------------------------------X 05 89 1.6% ----------------------------------X 06 69 1.2% --------------------------X 07 55 1.0% ---------------------X 08 45 0.8% -----------------X 09 40 0.7% ---------------X 10 40 0.7% ---------------X 11 42 0.8% ----------------X 12 51 0.9% -------------------X 13 57 1.0% ---------------------X 14 68 1.2% --------------------------X 15 75 1.3% ----------------------------X 16 77 1.4% -----------------------------X 17 92 1.6% -----------------------------------X 18 98 1.8% -------------------------------------X 19 105 1.9% ----------------------------------------X 20 108 1.9% -----------------------------------------X 21 113 2.0% -------------------------------------------X 22 124 2.2% -----------------------------------------------X 23 134 2.4% ---------------------------------------------------X

U Waterloo Data 24 Oct 2007

slide-63
SLIDE 63
  • 2. Self-Similar Traffic
slide-64
SLIDE 64

The traffic is bursty regardless of time scale

slide-65
SLIDE 65

Wikipedia

slide-66
SLIDE 66
  • 3. Poisson Session Arrival
slide-67
SLIDE 67

Remote logins, starting FTP, beginning of web surfing etc.

slide-68
SLIDE 68

(so are dead light bulbs, spelling mistakes, etc.)

slide-69
SLIDE 69
  • 4. Log-normal Duration
slide-70
SLIDE 70
  • 5. Heavy Tail Distributions
slide-71
SLIDE 71

Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, by Mark E. Crovella and Azer Bestavros

slide-72
SLIDE 72
  • 1. Looking for Invariants
slide-73
SLIDE 73
  • 2. Explore Parameter

Space

slide-74
SLIDE 74

Change one parameter, fix the rest

slide-75
SLIDE 75

Explore a wide range of values

slide-76
SLIDE 76
  • 3. Use Traces
slide-77
SLIDE 77

e.g. collects traces of web sessions, video files, VoIP traffic

slide-78
SLIDE 78

Use it to simulate the traffic source

slide-79
SLIDE 79

But must be careful about traffic shaping and user/application adaptation.

slide-80
SLIDE 80

e.g. traces collected during non- congested time should not be use to simulate congested networks.

slide-81
SLIDE 81
  • 4. publish simulator script for
  • thers to verify
slide-82
SLIDE 82

Conclusion

slide-83
SLIDE 83

Simulation is useful but needs to do it properly

slide-84
SLIDE 84

Be careful about your simulation model: you want it to be as simple as possible, but not simpler.

slide-85
SLIDE 85

Be careful about your conclusion: “A is 13.5% better than B” is probably useless.

slide-86
SLIDE 86

“A is 13.5% better than B under these environment” is better but not general

slide-87
SLIDE 87

Not really for quantitative results, but more for

slide-88
SLIDE 88

understanding the dynamics, illustrate a point, explore unexpected behavior.