




已阅读5页,还剩57页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
,Mark W. Garrett14 February 2001J. Baron, D. ShallcrossC. Huitema, J. DesMarais, B. Siegell, P. Seymour, F. Chung,An SAIC Company,Felix Project Inferential Topology Discovery:From Delay Data to Network Graph,Darpa ITOIntrusion Detection Program,Evaluate network status independently fromthe usual network management protocolsand data.E.g., no use of routing protocols, ping,traceroute, ICMP, SNMP, etcMeasure network by sending sparse probe packets among a set of monitors. Collect delay and loss data.From these data discover the network topology and evaluate the performance of all links in the network.Small new field of research developing called “Inferential Topology Discovery” (Kurose, Towsley, Paxson, McCanne, Caceras, Duffield, et al.)This talk presents a particular method based on modeling correlation across the observations.,The Felix ProjectGoals,Network MonitoringFelix Data Analysis Approach,raw data,measurement system,common component matrix,path component matrix,Identify links,Create graph,graph specification(nodes and links),Add geographicinformation,network graph,network map,Network elementand link performance,intermediate results,Network DiscoveryTerminology for Network Topology and Monitoring,For m monitors, there are np = m(m-1) pathsThe number of links is between m (star) and m2 (full mesh)Links are unidirectional So a line in the graph usually represents two links,Network Discovery Reduced Graph Concept,Define Reduced Graph as the sub-graph within the network that is discoverable.Excludes links not traversed by monitor packetsCombines equivalent edges, i.e. edges traversed by exactly the same set of paths.Non-series equivalent edges can occur when reducing a real graph, but they are very rare.,3150 nodesWAN-MAN-LAN design,100 monitors187 nodes698 (unidirectional) links,Network Discovery Example of Complete Network and Reduced Graph,Reduced graph tends to include more of backbone and less of edges,Network Discovery Reduced Graph Non-series Equivalent Edges,Here is an (artificially) symmetrical graph with equivalent edges.We have seen non-series equivalent edges only once in reducing randomly generated graphs (out of 100+ examples),Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2, 3 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 4 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 5 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 6 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 7 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 8 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 9 monitors is a successive approximation to the network.,Network Discovery Reduced Graph Related to Paths,Reduced graph determined by n = 2 10 monitors is a successive approximation to the network. Etc,The delay along a path = sum of delays for each linkDP = X dLX identifies topology (in terms of links on paths), and is always rank deficient.To illustrate, consider adding a constant delay to each link into a particular node, and subtracting from outgoing links.A variation on this general relationship can be formulated with each performance metric: packet loss, link load, throughput, congestion probability.,A Relationship Between Observable Path Metric, Topology and Link Performance,Felix Data MeasurementsRouting Changes Apparent in Data,Data courtesy of Advanced Network Solutions,Felix Data MeasurementsRouting Changes Apparent in Data,Data courtesy of Advanced Network Solutions,Felix Data MeasurementsRouting Changes Apparent in Data,Data courtesy of Advanced Network Solutions,Felix Topology DiscoveryCorrelation Method: Concept,Felix Correlation Method Identifying Links By Correlation of Paths,Felix Correlation MethodAbstracting Congestion Event Sequence From Data,Open problem: how exactly to get from a delay measurement on a real network to a series of thresholded congestion “events”.Several approaches:Average delay in a fixed-length sliding windowCross-correlation function (pair-wise between paths, but promising)Congestion decision can be complex combination of delay and loss in window probably most robust method, but needs some empirical experience to create useful methodology.We assume a solution and solve the next part,Felix Correlation MethodNetwork Model Assumptions,Node processing delay is negligible, so paths sharing nodes(but not links) do not show correlation. Queueing delay is associated with the link.Network links congest independently.Congestion is modeled asfixed-length discrete-time eventsCongestion rate is fixed for eachlink, but can vary over a range forthe set of links in the network.Routes are stable Monitor packets are exchangedfrequently enough that congestionevents will be recorded consistentlyacross all paths crossing a given link.Note, this does not require every event to be noticed, and real congestion events do occur over a wide range of time scales.,Felix Correlation MethodObservations and Triggers,An Observation is a measurement of congestion (however defined) on a path between two monitors.A Trigger is a hypothetical cause of congestion, such as a link, or a group of links, in the network. Method of solution:,Based on joint observations across all paths, define a model that discriminates statistically between the true triggers, that represent links in the network, and the apparent (or false) triggers that are due to combinations of true links congesting simultaneously. Then reduce the triggers down to single links.,Felix Correlation MethodObservations and Triggers,Definitions and Notation:An observation event occurs at time t, when a set of paths are congested and not congested as specified.For example,is the observation that paths a, b, d, k are congested and paths c, g are not congested at time t. Paths not included in the subscript are “dont care” for this observation variable.,Illustration of observations, triggers, paths and links:,Observation “a” = path M1M3,Observation “b” = path M2M4Trigger a = all links on path aTrigger ab = links in common between paths a and b,Felix Correlation MethodObservations and Triggers,A trigger event occurs at time t, when at least one link congested that is a member (or not a member) of a set of paths as specified.For example,is the event that some link congests that is shared by paths a, b, d, k, and is not on path c, or path g.We refer to paths in the specification as “included” or “excluded”If all paths are included or excluded, the trigger is “fully specified”Observation and Trigger Probabilities follow these examples:,Felix Correlation MethodRelationship Between Observations and Triggers,Now we can related the observation and trigger probabilities in several interesting ways. E.g., Ratnasamy & McCanne,This set says, considering only two paths, if we see congestion on both paths, then it is caused either by a link the two paths share in common, or one link on each of the paths (not in common) are congesting together.Similarly, if we see congestion on only one path, it must be due to a link that is on that path, and not on the other.Note, this forces us to explicitly write the combinations of triggers that can cause an observation (not very scaleable).,Felix Correlation MethodRelationship Between Observations and Triggers,Another interesting and useful relationship is this:,This one says that we observe no congestion on a set of paths only when none of the triggers that are on those paths are active.We say a path (in the trigger specification) contradicts the observation when a path turned off in the observation is included in the trigger. (It is easy to write down these combinations.)Inclusion of observations with multiple paths makes this model more powerful than an earlier method (DP = X dL) that relied on a rank-deficient matrix.,Felix Correlation MethodOrganization of Triggers,Tree contains all potential triggers, i.e., all possible combinations of paths that can specify a link or group of links.Triggers on a level partition the set of (potential) links in the graphThe tree grows exponentially as we add paths, but the number of true triggers is bounded by the number of links in the network.,Felix Correlation MethodSome More Useful Stuff From the Model,Observation of congestion on a path means some link on that path is congesting (single-path observation and trigger).Something must be happening, so the sum over all possible observations with n paths specified equals unity.Child triggers are related to their parent.No congestion observed anywhere means all triggers are quiet. (The product of all inverse triggers on any level is constant.),Felix Correlation MethodSolving for Trigger Probabilities 3 Path Example,Observation of no congestion on 3,2,1 paths implies no activity on any trigger that includes one of the named pathsTriangular form: each equation produces one Pvt,Felix Correlation MethodGeneralization of Solution to Any Number of Paths,Count various things:n = number of paths in the triggers = level in tree diagramk = number of paths in the observation (varying from n down to 1)j = number of paths excluded in the triggers (varying from 0 to n-1),Divide “Master” equation by each “Specific” equation to find one trigger probability,Felix Correlation MethodGeneralization of Solution to Any Number of Paths,For n paths there are 2n-1 equations and 2n-1 triggers.The “Master” equation has all possible triggers, i.e., any active trigger contradicts the observation of no congestion anywhere.For class 1 triggers (0 j k):The j paths excluded in the trigger cannot cover all k paths in the observation, so at least one path is included in the trigger that contradicts the observation.All triggers then occur in both the master and specific equations, and cancel out in the division.For class 2 triggers (j = k):The j paths excluded in the trigger can cover the k paths in the observation, but there is only one combination. Call this the target trigger. All other triggers contradict the observation and cancel out.There is one equation in which each such target trigger survives the division.,Felix Correlation MethodGeneralization of Solution to Any Number of Paths,For class 3 triggers (k j n-1):There are such triggers.No class 3 triggers exist in the first two stages(k = n, and k = n1)All class 3 triggers are computed at previous stages, when they appear as class 2 triggers.For example, consider the case k = 8 j = 9. In the previous stage when we had k = 9, the class 2 triggers with j = 9 were solved. Each “Quotient” equation is left with one unknown trigger,Felix Correlation MethodGeneralization of Solution to Any Number of Paths,General form of solution, for trigger probabilities with paths excluded (first case), and with no paths excluded (second case):,Where:E is the set of excluded paths in the triggerI is the set of included paths in the triggerN is the set of all pathsw is the set of class-3 trigger probabilities in the master equation, but not in the specific equationu is the set of all trigger probabilities with at least one path excluded.,Felix Correlation MethodPruning Tree Reduces Computational Complexity,Returning to the tree of trigger probabilities For triggers that specify actual links in the network, the trigger probability is the (aggregate) congestion rate on that set of links.False triggers (for which no link exists) are approximately zero(True) triggers on the last level identify single links and their associated paths (reduced graph).Therefore, a trigger prob. of zero can be pruned out along with all of its descendents.Number of triggers to compute is bounded by (paths links).,Lets see some results,Felix Correlation MethodResults,18 monitors 23 nodes95 (unidirectional) links,Felix Correlation MethodResults,19 monitors 27 nodes114 (unidirectional) links,Felix Correlation MethodResults,20 monitors 29 nodes121 (unidirectional) links,Felix Correlation MethodResults,50 monitors 61 nodes269 (unidirectional) links,Run with link congestion rate of 1% (best efficiency) Approx 12 hours to compute,Felix Correlation MethodAlgorithm Complexity,Complexity of correlation algorithm is more than (paths links) because the computation of triggers increases with number of paths but it is polynomial: O(LPN + L2P) for L links, P paths, N simulated time intervals.However, the overall run-time is apparently exponential, because it takes more data to discriminate the true and false triggers as the network gets larger.,Felix Correlation MethodAlgorithm Complexity,Running time of simulation and correlation code as function of network size (number of links)Exponential increase if quality of result held constant.Link Congestion Rate = 10% (constant).,Felix Correlation MethodResults With Variable Link Congestion,Constant link congestion rate is artificial constraintAlgorithm works well with links congesting in a range,e.g., tried 1% 5%, 1% 10%, 1% 15%, etc.Effect is to spread the distribution of true trigger probabilitiesLonger convergence timeProbably all of the simplifying assumptions in the model can be relaxed at the cost of increased convergence time.Correlation algorithm ran fastest with 1% link congestionProbably an artifact of implementation,Felix Correlation MethodStatistical Discrimination Problem,Nice scaling property of the algorithm depends on being able to discriminate true from false triggers.False triggers are approximately zero, but at edge of solvable parameter space, both populations are more noisyToo little data (from simulation or measurement)Too much variability in link loss ratesToo much dependence between link congestions, etc, etcNeed to set threshold, group triggers and evaluate “goodness” of resulting topology.,Felix ProjectGeneral Discussion,We can make use of multicast idea (MINC project) to reduce load on network: each source multicasts packets to all receivers.This will improve coincidence of measurements in time across all paths.,Felix Topology / Performance InferenceApplicability,Does not replace “traditional” autodiscovery methods (SNMP)May augment autodiscovery in difficult environment:Military network under physical attackMilitary or commercial network under cyber-attackNetwork with buggy software (e.g. routing implementation)Multiple protocol layers, not all included in autodiscoveryProtocols too old or new for the autodiscovery technologyGood for observing networks not under your controlCommercial context: ISP tries to locate fault between networksMilitary context: Map out foreign networkFuture networks will probably be more chaoticTrack changing topology & performance with minimal extra load,Felix ProjectFurther Work,Augment algorithms to work in more fully realistic environment:Non-discrete time: congestion events with “ragged edges”Less stable routing (this is hard)Dependence in link congestion cross traffic routed through netMore volatile delay and loss patterns (most significant issue)Wider range of congestion rates; more erratic time dependenceVariation with delay metric (instead of probability of congestion) is possible.Result would be bounds on mean, variance, (higher moments) of delay distribution on each link.Procedure is analogous (but not identical) to present algorithm.Progressive version of algorithm to update existing topology estimate based on continuous data.More experience with real data,Felix Correlation MethodSummary: Three Stages in Topology Discovery,Reduced graph concept: limitation of observabilityDecomposition of topology/performance inference into separable problemsAllows optimization and variation of algorithms at each stageCorrelation Method:Uses entire time series of data for each path.Takes advantage of joint statistics across all paths,Future Work,Felix Project,Extra Slides,Topology Discovery and Performance Assessment: 6 Methods,“Matrix” methodEvaluates “goodness” of topology, solve
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 手机销售方案
- 聚丙烯车间级安全培训课件
- 森林比美大赛450字(7篇)
- 安全岗位职责说明书讲解
- 包头医学院第二附属医院招聘考试真题2024
- 教师招聘之《幼儿教师招聘》高分题库含答案详解【a卷】
- 教师招聘之《小学教师招聘》试卷附答案详解【综合题】
- 基于2025年政策的医疗信息化项目可持续发展策略
- 聋哑职工安全培训课件
- 安全省产培训课件
- 集团公司石油工程专业化整合重组总体方案
- 现代设计理论与方法(上)
- EP 中文的课件资料
- 碳纤维材料工程检验批质量验收记录表优质资料
- GB/T 95-2002平垫圈C级
- 现代化工绿色化工课件
- 单孔腹腔镜课程讲义课件
- 人工血管动静脉内瘘术后护理课件
- 普通逻辑ppt课件(完整版)
- 《小学语文课程与教学论》复习题
- DB32∕T 4065-2021 建筑幕墙工程技术标准
评论
0/150
提交评论