9 research outputs found
Pathfinder: Application-Aware Distributed Path Computation in Clouds
Path computation in a network is dependent on the network’s processes
and resource usage pattern. While distributed traffic control methods improve the
scalability of a system, their topology and link state conditions may influence the
sub-optimal path computation. Herein, we present Pathfinder, an application-aware
distributed path computation model. The proposed model framework can improve path
computation functions through software-defined network controls. In the paper, we
first analyse the key issues in distributed path computation functions and then present
Pathfinder’s system architecture, followed by its design principles and orchestration
environment. Furthermore, we evaluate our system’s performance by comparing it
with FreeFlow and Prune-Dijk techniques. Our results demonstrate that Pathfinder
outperforms these two techniques and delivers significant improvement in the system’s
resource utilisation behaviour
Active Learning of Multiple Source Multiple Destination Topologies
We consider the problem of inferring the topology of a network with
sources and receivers (hereafter referred to as an -by- network), by
sending probes between the sources and receivers. Prior work has shown that
this problem can be decomposed into two parts: first, infer smaller subnetwork
components (i.e., -by-'s or -by-'s) and then merge these components
to identify the -by- topology. In this paper, we focus on the second
part, which had previously received less attention in the literature. In
particular, we assume that a -by- topology is given and that all
-by- components can be queried and learned using end-to-end probes. The
problem is which -by-'s to query and how to merge them with the given
-by-, so as to exactly identify the -by- topology, and optimize a
number of performance metrics, including the number of queries (which directly
translates into measurement bandwidth), time complexity, and memory usage. We
provide a lower bound, , on the number of
-by-'s required by any active learning algorithm and propose two greedy
algorithms. The first algorithm follows the framework of multiple hypothesis
testing, in particular Generalized Binary Search (GBS), since our problem is
one of active learning, from -by- queries. The second algorithm is called
the Receiver Elimination Algorithm (REA) and follows a bottom-up approach: at
every step, it selects two receivers, queries the corresponding -by-, and
merges it with the given -by-; it requires exactly steps, which is
much less than all possible -by-'s. Simulation results
over synthetic and realistic topologies demonstrate that both algorithms
correctly identify the -by- topology and are near-optimal, but REA is
more efficient in practice
Multicast-based Weight Inference in General Network Topologies
Network topology plays an important role in many
network operations. However, it is very difficult to obtain
the topology of public networks due to the lack of internal
cooperation. Network tomography provides a powerful solution
that can infer the network routing topology from end-to-end
measurements. Existing solutions all assume that routes from a
single source form a tree. However, with the rapid deployment
of Software Defined Networking (SDN) and Network Function
Virtualization (NFV), the routing paths in modern networks are
becoming more complex. To address this problem, we propose
a novel inference problem, called the weight inference problem,
which infers the finest-granularity information from end-to-end
measurements on general routing paths in general topologies.
Our measurements are based on emulated multicast probes with
a controllable “width”. We show that the problem has a unique
solution when the multicast width is unconstrained; otherwise,
we show that the problem can be treated as a sparse approximation problem, which allows us to apply variations of the
pursuit algorithms. Simulations based on real network topologies
show that our solution significantly outperforms a state-of-theart network tomography algorithm, and increasing the width of
multicast substantially improves the inference accuracy
Compact mixed integer linear programming models to the Minimum Weighted Tree Reconstruction problem
The Minimum Weighted Tree Reconstruction (MWTR) problem consists of finding a minimum length weighted tree connecting a set of terminal nodes in such a way that the length of the path between each pair of terminal nodes is greater than or equal to a given distance between the considered pair of terminal nodes. This problem has applications in several areas, namely, the inference of phylogenetic trees, the modeling of traffic networks and the analysis of internet infrastructures. In this paper, we investigate the MWTR problem and we present two compact mixed-integer linear programming models to solve the problem. Computational results using two different sets of instances, one from the phylogenetic area and another from the telecommunications area, show that the best of the two models is able to solve instances of the problem having up to 15 terminal nodes
Network delay inference from additive metrics
We use computational phylogenetic techniques to solve a central problem in inferential network monitoring. More precisely, we design a novel algorithm for multicast-based delay inference, that is, the problem of reconstructing delay characteristics of a network from end-to-end delay measurements on network paths. Our inference algorithm is based on additive metric techniques used in phylogenetics. It runs in polynomial time and requires a sample of size only poly(log n). We also show how to recover the topology of the routing tree
Descoberta da topologia de rede
Doutoramento em MatemáticaA monitorização e avaliação do desempenho de uma rede são essenciais
para detetar e resolver falhas no seu funcionamento. De modo a
conseguir efetuar essa monitorização, e essencial conhecer a topologia
da rede, que muitas vezes e desconhecida. Muitas das técnicas usadas
para a descoberta da topologia requerem a cooperação de todos os
dispositivos de rede, o que devido a questões e políticas de segurança
e quase impossível de acontecer. Torna-se assim necessário utilizar
técnicas que recolham, passivamente e sem a cooperação de dispositivos
intermédios, informação que permita a inferência da topologia
da rede. Isto pode ser feito recorrendo a técnicas de tomografia, que
usam medições extremo-a-extremo, tais como o atraso sofrido pelos
pacotes.
Nesta tese usamos métodos de programação linear inteira para resolver
o problema de inferir uma topologia de rede usando apenas medições
extremo-a-extremo. Apresentamos duas formulações compactas de
programação linear inteira mista (MILP) para resolver o problema.
Resultados computacionais mostraram que a medida que o número de
dispositivos terminais cresce, o tempo que as duas formulações MILP
compactas necessitam para resolver o problema, também cresce rapidamente.
Consequentemente, elaborámos duas heurísticas com base
nos métodos Feasibility Pump e Local ranching. Uma vez que as medidas
de atraso têm erros associados, desenvolvemos duas abordagens
robustas, um para controlar o número máximo de desvios e outra para
reduzir o risco de custo alto. Criámos ainda um sistema que mede
os atrasos de pacotes entre computadores de uma rede e apresenta a
topologia dessa rede.Monitoring and evaluating the performance of a network is essential
to detect and resolve network failures. In order to achieve this monitoring
level, it is essential to know the topology of the network which
is often unknown. Many of the techniques used to discover the topology
require the cooperation of all network devices, which is almost
impossible due to security and policy issues. It is therefore, necessary
to use techniques that collect, passively and without the cooperation
of intermediate devices, the necessary information to allow the inference
of the network topology. This can be done using tomography
techniques, which use end-to-end measurements, such as the packet
delays.
In this thesis, we used some integer linear programming theory and
methods to solve the problem of inferring a network topology using
only end-to-end measurements. We present two compact mixed integer
linear programming (MILP) formulations to solve the problem. Computational
results showed that as the number of end-devices grows, the
time need by the two compact MILP formulations to solve the problem
also grows rapidly. Therefore, we elaborate two heuristics based on the
Feasibility Pump and Local Branching method. Since the packet delay
measurements have some errors associated, we developed two robust
approaches, one to control the maximum number of deviations and
the other to reduce the risk of high cost. We also created a system
that measures the packet delays between computers on a network and
displays the topology of that network
Large-deviation analysis and applications Of learning tree-structured graphical models
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student submitted PDF version of thesis.Includes bibliographical references (p. 213-228).The design and analysis of complexity-reduced representations for multivariate data is important in many scientific and engineering domains. This thesis explores such representations from two different perspectives: deriving and analyzing performance measures for learning tree-structured graphical models and salient feature subset selection for discrimination. Graphical models have proven to be a flexible class of probabilistic models for approximating high-dimensional data. Learning the structure of such models from data is an important generic task. It is known that if the data are drawn from tree-structured distributions, then the algorithm of Chow and Liu (1968) provides an efficient algorithm for finding the tree that maximizes the likelihood of the data. We leverage this algorithm and the theory of large deviations to derive the error exponent of structure learning for discrete and Gaussian graphical models. We determine the extremal tree structures for learning, that is, the structures that lead to the highest and lowest exponents. We prove that the star minimizes the exponent and the chain maximizes the exponent, which means that among all unlabeled trees, the star and the chain are the worst and best for learning respectively. The analysis is also extended to learning foreststructured graphical models by augmenting the Chow-Liu algorithm with a thresholding procedure. We prove scaling laws on the number of samples and the number variables for structure learning to remain consistent in high-dimensions. The next part of the thesis is concerned with discrimination. We design computationally efficient tree-based algorithms to learn pairs of distributions that are specifically adapted to the task of discrimination and show that they perform well on various datasets vis-`a-vis existing tree-based algorithms. We define the notion of a salient set for discrimination using information-theoretic quantities and derive scaling laws on the number of samples so that the salient set can be recovered asymptotically.by Vincent Yan Fu Tan.Ph.D