tomography based overlay network monitoring
play

Tomography-based Overlay Network Monitoring Yan Chen, David Bindel, - PowerPoint PPT Presentation

Tomography-based Overlay Network Monitoring Yan Chen, David Bindel, and Randy H. Katz UC Berkeley Motivation Infrastructure ossification led to thrust of overlay and P2P applications Such applications flexible on paths and targets,


  1. Tomography-based Overlay Network Monitoring Yan Chen, David Bindel, and Randy H. Katz UC Berkeley

  2. Motivation • Infrastructure ossification led to thrust of overlay and P2P applications • Such applications flexible on paths and targets, thus can benefit from E2E distance monitoring – Overlay routing/location – VPN management/provisioning – Service redirection/placement … • Requirements for E2E monitoring system – Scalable & efficient: small amount of probing traffic – Accurate: capture congestion/failures – Incrementally deployable – Easy to use

  3. Existing Work • General Metrics: RON ( n 2 measurement) • Latency Estimation – Clustering-based: IDMaps, Internet Isobar, etc. – Coordinate-based: GNP, ICS, Virtual Landmarks • Network tomography – Focusing on inferring the characteristics of physical links rather than E2E paths – Limited measurements -> under-constrained system, unidentifiable links

  4. Problem Formulation Given an overlay of n end hosts and O( n 2 ) paths, how to select a minimal subset of paths to monitor so that the loss rates/latency of all other paths can be inferred. Assumptions: • Topology measurable • Can only measure the E2E path, not the link

  5. Our Approach topology Overlay Network Operation Center measurements End hosts Select a basis set of k paths that fully describe O( n 2 ) paths ( k «O( n 2 )) • Monitor the loss rates of k paths, and infer the loss rates of all other paths • Applicable for any additive metrics, like latency

  6. A 1 3 p 1 Modeling of Path Space D C 2 B − = − − 1 p ( 1 l )( 1 l ) Path loss rate p , link loss rate l 1 1 2 −   log( 1 l ) 1   [ ] − = − + − = − log( 1 p ) log( 1 l ) log( 1 l ) 1 1 0 log( 1 l ) 1 1 2  2    − log( 1 l )   3   x 1   [ ] = 1 1 0 x b  2  1   x   3

  7. A 1 3 p 1 Putting All Paths Together D C 2 B Totally r = O( n 2 ) paths, s links, s « r × = ∈ r s Gx b , G { 0 | 1 } where path matrix ∈ ℜ × ∈ ℜ × s 1 r 1 x , b link loss rate vector path loss rate vector = …

  8. Sample Path Matrix x 2 A b 2  1 1 0  (1,1,0)   = (1,-1,0) G 0 0 1 1 path/row space 3 b 1   (measured)   1 1 1   D null space b 3  x   b  x 1 (unmeasured) C 1 1 2     = G x b  2   2  x 3 B     x b     3 3 • x 1 - x 2 unknown => cannot compute x 1 , x 2       1 0 b / 2 1 + • Set of vectors ( x x ) α −       [ 1 1 0 ] T = + = 1 2 x 1 x 0 b / 2       G 3 1 form null space 2       0 1 b       • To separate identifiable vs. 2   1 unidentifiable components: − ( x x )   x = x G + x N = − x 1 2 1   N 2   0  

  9. Intuition through Topology Virtualization x 2 Virtual links : (1,1,0) (1,-1,0) path/row space • Minimal path (measured) null space segments x 1 (unmeasured) whose loss x 3 A b 2 rates uniquely 1 3 b 1 Virtualization ⇒ 2 identified 1 D Virtual links b 3 • Can fully C 2 describe all B       1 0 b / 2 paths 1 + ( x x )       = + = x G 1 2 1 x 0 b / 2 • x G is composed       3 1 2       of virtual links 0 1 b       2 All E2E paths are in path = = + = b Gx Gx Gx Gx space, i.e ., Gx N = 0 G N G

  10. More Examples 1   1 1 0 ⇒ = G 1’ 2’   2 1 1 0 1   2 3 Rank(G)=2   1 1 0 0 2’   1’ 1 1 1 0 1 0 3’   2 ⇒ = G   0 1 0 1 2 4   3 0 0 1 1   3 4’ Virtualization Rank(G)=3 Real links (solid) and all of the overlay Virtual links paths (dotted) traversing them

  11. Algorithms x = G b • Select k = rank( G ) linearly G independent paths to monitor = – Use QR decomposition … – Leverage sparse matrix: time O( rk 2 ) and memory O( k 2 ) • E.g., 10 minutes for n = 350 ( r = 61075) and k = 2958 • Compute the loss rates of = … other paths – Time O( k 2 ) and memory O( k 2 )

  12. How many measurements saved ? k « O( n 2 ) ? For a power-law Internet topology • When the majority of end hosts are on the overlay k = O( n ) (with proof) • When a small portion of end hosts are on overlay – If Internet a pure hierarchical structure (tree): k = O( n ) – If Internet no hierarchy at all (worst case, clique): k = O( n 2 ) – Internet has moderate hierarchical structure [TGJ+02] For reasonably large n , (e.g., 100), k = O( n log n ) (extensive linear regression tests on both synthetic and real topologies)

  13. Practical Issues • Topology measurement errors tolerance • Measurement load balancing on end hosts – Randomized algorithm • Adaptive to topology changes – Add/remove end hosts and routing changes – Efficient algorithms for incrementally update of selected paths

  14. Evaluation • Extensive Simulations # of Areas and Domains hosts • Experiments on PlanetLab .edu 33 – 51 hosts, each from different .org 3 organizations US (40) .net 2 – 51 × 50 = 2,550 paths .gov 1 – On average k = 872 .us 1 • Results Highlight France 1 – Avg real loss rate: 0.023 Sweden 1 – Absolute error mean: 0.0027 Europe (6) Denmark 1 90% < 0.014 Germany 1 – Relative error mean: 1.1 Interna- tional UK 2 90% < 2.0 (11) Taiwan 1 – On average 248 out of 2550 Asia (2) paths have no or incomplete Hong Kong 1 routing information Canada 2 – No router aliases resolved Australia 1

  15. Conclusions • A tomography-based overlay network monitoring system – Given n end hosts, characterize O( n 2 ) paths with a basis set of O( n log n ) paths – Selectively monitor the basis set for their loss rates, then infer the loss rates of all other paths • Both simulation and PlanetLab experiments show promising results

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend