SlideShare uma empresa Scribd logo
1 de 83
Baixar para ler offline
Methodologies for
        Networking Research


2 October 2009
   CS5229, Semester 1, 2009/10
   1
Measurement"
     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”




2 October 2009
      CS5229, Semester 1, 2009/10
       2
“Reality Check”
     Are our assumptions reasonable? Is our
     mathematical model a good estimation of the
     real world? 



2 October 2009
    CS5229, Semester 1, 2009/10
    3
2 October 2009
   CS5229, Semester 1, 2009/10
   5
2 October 2009
   CS5229, Semester 1, 2009/10
   6
Experimentation"
                  
     e.g., V. Jacobson. “Congestion Control and
     Avoidance"




2 October 2009
       CS5229, Semester 1, 2009/10
   7
Deal with implementation
 issues
 Sometimes unforeseen complexities (e.g. own
 research experience in Unreliable TCP) 




2 October 2009
   CS5229, Semester 1, 2009/10
   8
Understand the
  Behavior of Systems
 Some systems are too complex to understand
 with “thought experiments” alone.




2 October 2009
   CS5229, Semester 1, 2009/10
   9
2 October 2009
   CS5229, Semester 1, 2009/10
   10
2 October 2009
   CS5229, Semester 1, 2009/10
   11
Analysis"
     D. Chiu and R. Jain, "Analysis of the increase and
     decrease algorithms for congestion avoidance in
     computer networks,”"

     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose

                           
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”


2 October 2009
       CS5229, Semester 1, 2009/10
        12
Explore with Complete
 Control
 We can understand the basic forces that affect
 the system. e.g. TCP throughput is inversely
 propotional to √p




2 October 2009
   CS5229, Semester 1, 2009/10
    13
Simplify complex
  systems
   But, if too simplified, important behavior could
   be missed (TCP throughput without timeout)




2 October 2009
    CS5229, Semester 1, 2009/10
      14
Simulation"
         K. Fall and S. Floyd, "Simulation-based
         comparison of Tahoe, Reno, and SACK TCP,""

         S. Floyd, V. Jacobson, "Random Early Detection
         Gateways for Congestion Avoidance,"




2 October 2009
        CS5229, Semester 1, 2009/10
       15
Check Correctness of
 Analysis
 If a simulation uses the same assumptions/model
 as the analysis, this simply verifies the
 correctness of the mathematical derivations.




2 October 2009
   CS5229, Semester 1, 2009/10
     16
Check Correctness of
 Analysis
 Simulation can relax some assumptions, use more
 complex models, etc. to test the limits of analysis.

 (Real measurement/experiments still needed to
 check the usefulness of analysis results)


2 October 2009
    CS5229, Semester 1, 2009/10
          17
Explore Complex
 Systems
 Some systems are too difficult/impossible to
 analyzed (e.g. Internet) 




2 October 2009
   CS5229, Semester 1, 2009/10
   18
Helps Develop Intuition"




2 October 2009
   CS5229, Semester 1, 2009/10
   19
Measurement"
    Experimentation" 
Real World
                                                 }
    Analysis"
    Simulation" 
             }
                  Abstract Model




2 October 2009
   CS5229, Semester 1, 2009/10
       20
“Difficulties in
Simulating the Internet” "
    Sally Floyd, Van Paxson"
                              
 ACM/IEEE TON, 9(4) August 2001
Why is Internet hard to
            simulate?


2 October 2009
   CS5229, Semester 1, 2009/10
   22
1.!
                  Internet is diverse

2 October 2009
        CS5229, Semester 1, 2009/10
   23
End-hosts: phones,
     desktops, servers, iPod, Wii



2 October 2009
   CS5229, Semester 1, 2009/10
   24
Links: Ethernet, WiFi,
     Satellite, Dial-up, 3G



2 October 2009
   CS5229, Semester 1, 2009/10
   25
Transport: TCP variants,
     UDP, DCCP



2 October 2009
   CS5229, Semester 1, 2009/10
   26
Applications: games,
     videos, web, ftp, bittorrent 



2 October 2009
   CS5229, Semester 1, 2009/10
   27
2.!
                  Internet is huge

2 October 2009
      CS5229, Semester 1, 2009/10
   28
570,937,778
                   Number of Hosts as of July 2008
      http://www.isc.org/index.pl?/ops/ds/host-count-history.php




2 October 2009
         CS5229, Semester 1, 2009/10
                29
681,064,561
                        Number of Hosts as of July 2009
                  https://www.isc.org/solutions/survey/history




2 October 2009
              CS5229, Semester 1, 2009/10
         30
3.!
           Internet is changing

2 October 2009
   CS5229, Semester 1, 2009/10
   31
http://www.isc.org/ds/
2 October 2009
    CS5229, Semester 1, 2009/10
   32
2 October 2009
        CS5229, Semester 1, 2009/10
   33
                  http://www.dtc.umn.edu/mints/
Why is Internet hard to
     simulate?"

     1. Heterogeneous "
     2. Huge "
     3. Changing
2 October 2009
   CS5229, Semester 1, 2009/10
   35
What Internet topology
     should you use in your
     simulation?
     How are end hosts connected? What are the
     properties of the links?




2 October 2009
     CS5229, Semester 1, 2009/10
   38
Topology changes constantly"
 Companies keep info secrets"
 Routes may change"
 Routes may be asymmetric

2 October 2009
   CS5229, Semester 1, 2009/10
   39
You will need to simulate over
     a wide range of connectivity
     and link properties



2 October 2009
   CS5229, Semester 1, 2009/10
   40
Which TCP version to
     use?


2 October 2009
   CS5229, Semester 1, 2009/10
   43
Using “fingerprinting”,
     831 different TCP
     implementations and
     versions are identified.

2 October 2009
   CS5229, Semester 1, 2009/10
   44
Which to use? "
     Which to ignore? 


2 October 2009
   CS5229, Semester 1, 2009/10
   45
What applications to run? "

     What type of traffic to generate?"

     Telnet? FTP? Web? BitTorrent?
     Skype? 

2 October 2009
   CS5229, Semester 1, 2009/10
   46
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   47
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   48
Example from Sally Floyd:
RED vs DropTail


2 October 2009
   CS5229, Semester 1, 2009/10
   49
2 October 2009
   CS5229, Semester 1, 2009/10
   50
2 October 2009
   CS5229, Semester 1, 2009/10
   51
Example from Sally Floyd:
TFRC for VoIP


2 October 2009
   CS5229, Semester 1, 2009/10
   52
2 October 2009
   CS5229, Semester 1, 2009/10
   53
2 October 2009
   CS5229, Semester 1, 2009/10
   54
We can focus our
     simulation on dominant
     technology/application
     today..

2 October 2009
   CS5229, Semester 1, 2009/10
   55
TCP: NewReno SACKS"
     OS: Windows Linux"
     Applications: Web, FTP

2 October 2009
   CS5229, Semester 1, 2009/10
   56
What about tomorrow?


2 October 2009
   CS5229, Semester 1, 2009/10
   57
WiMax? "
     Sensors? "
     Virtual World?"
     DCCP?

2 October 2009
   CS5229, Semester 1, 2009/10
   58
How to verify the
    simulation is correct?


2 October 2009
   CS5229, Semester 1, 2009/10
   60
Looking for
                   Invariants


2 October 2009
     CS5229, Semester 1, 2009/10
   62
1. Diurnal Patterns


2 October 2009
   CS5229, Semester 1, 2009/10
   63
2 October 2009
   CS5229, Semester 1, 2009/10
   64
hour #constrained

---- ------------

  00   139   2.5%    -----------------------------------------------------X

  01   144   2.6%    ------------------------------------------------------X

  02   146   2.6%    -------------------------------------------------------X

  03   140   2.5%    -----------------------------------------------------X

  04   119   2.1%    ---------------------------------------------X

  05    89   1.6%    ----------------------------------X

  06    69   1.2%    --------------------------X

  07    55   1.0%    ---------------------X

  08    45   0.8%    -----------------X

  09    40   0.7%    ---------------X

  10    40   0.7%    ---------------X

  11    42   0.8%    ----------------X

  12    51   0.9%    -------------------X

  13    57   1.0%    ---------------------X

  14    68   1.2%    --------------------------X

  15    75   1.3%    ----------------------------X

  16    77   1.4%    -----------------------------X

  17    92   1.6%    -----------------------------------X

  18    98   1.8%    -------------------------------------X

  19   105   1.9%    ----------------------------------------X

  20   108   1.9%    -----------------------------------------X

  21   113   2.0%    -------------------------------------------X

  22   124   2.2%    -----------------------------------------------X

  23   134   2.4%    ---------------------------------------------------X	



                      U Waterloo Data 24 Oct 2007
2 October 2009
               CS5229, Semester 1, 2009/10
                       65
2. Self-Similar Traffic


2 October 2009
   CS5229, Semester 1, 2009/10
   66
The traffic is bursty
    regardless of time scale


2 October 2009
   CS5229, Semester 1, 2009/10
   67
Wikipedia

2 October 2009
   CS5229, Semester 1, 2009/10
   68
3. Poisson Session
                   Arrival


2 October 2009
   CS5229, Semester 1, 2009/10
   69
Remote logins, starting
     FTP, beginning of web
          surfing etc.

2 October 2009
   CS5229, Semester 1, 2009/10
   70
(so are dead light bulbs,
     spelling mistakes, etc.)


2 October 2009
   CS5229, Semester 1, 2009/10
   71
4. Log-normal Duration


2 October 2009
   CS5229, Semester 1, 2009/10
   72
5. Heavy Tail
                  Distributions


2 October 2009
     CS5229, Semester 1, 2009/10
   73
Self-Similarity in World Wide Web Traffic: Evidence and Possible
      Causes, by Mark E. Crovella and Azer Bestavros
2 October 2009
          CS5229, Semester 1, 2009/10
               74
1. Looking for
                    Invariants


2 October 2009
      CS5229, Semester 1, 2009/10
   75
2. Explore Parameter
              Space


2 October 2009
   CS5229, Semester 1, 2009/10
   76
Change one parameter,"
                       fix the rest



2 October 2009
        CS5229, Semester 1, 2009/10
   77
Explore a wide range of values




2 October 2009
   CS5229, Semester 1, 2009/10
   78
3. Use Traces


2 October 2009
     CS5229, Semester 1, 2009/10
   79
e.g. collects traces of web
     sessions, video files, VoIP traffic



2 October 2009
   CS5229, Semester 1, 2009/10
   80
Use it to simulate the traffic
                      source



2 October 2009
    CS5229, Semester 1, 2009/10
   81
But must be careful about traffic
     shaping and user/application
              adaptation. 



2 October 2009
   CS5229, Semester 1, 2009/10
   82
e.g. traces collected during non-
congested time should not be use to
   simulate congested networks. 



2 October 2009
   CS5229, Semester 1, 2009/10
   83
4. publish simulator script for
                 others to verify



2 October 2009
   CS5229, Semester 1, 2009/10
   84
Conclusion


2 October 2009
    CS5229, Semester 1, 2009/10
   85
Simulation is useful but needs to
             do it properly



2 October 2009
   CS5229, Semester 1, 2009/10
   86
Be careful about your simulation
  model: you want it to be as simple
    as possible, but not simpler.



2 October 2009
   CS5229, Semester 1, 2009/10
   87
Be careful about your conclusion:
     “A is 13.5% better than B” is
           probably useless.



2 October 2009
   CS5229, Semester 1, 2009/10
   88
“A is 13.5% better than B under
             these environment”"
          is better but not general



2 October 2009
   CS5229, Semester 1, 2009/10
   89
Not really for quantitative results,
               but more for



2 October 2009
   CS5229, Semester 1, 2009/10
   90
understanding the dynamics,"
illustrate a point,"
explore unexpected behavior.



2 October 2009
   CS5229, Semester 1, 2009/10
   91

Mais conteúdo relacionado

Semelhante a CS5229 09/10 Lecture 6: Simulation

Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
Wei Tsang Ooi
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the Internet
Wei Tsang Ooi
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
Videoguy
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Benjamin Cabé
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
Benjamin Cabé
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle years
Alan Quayle
 

Semelhante a CS5229 09/10 Lecture 6: Simulation (20)

Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the Internet
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
Cse 318  Project Report on Goethe Institut Bangladesh Network DesignCse 318  Project Report on Goethe Institut Bangladesh Network Design
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Linking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code ArtifactsLinking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code Artifacts
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
Symfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo PragueSymfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo Prague
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
 
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdfA Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
 
Lecture 5: RED
Lecture 5: REDLecture 5: RED
Lecture 5: RED
 
Introduction to Building Communication Protocols
Introduction to Building Communication Protocols Introduction to Building Communication Protocols
Introduction to Building Communication Protocols
 
Nido
NidoNido
Nido
 
My Name is E & Open Standards
My Name is E & Open StandardsMy Name is E & Open Standards
My Name is E & Open Standards
 
Developer Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundationDeveloper Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundation
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle years
 
DjangoCon 2009 Keynote
DjangoCon 2009 KeynoteDjangoCon 2009 Keynote
DjangoCon 2009 Keynote
 

Mais de Wei Tsang Ooi

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
Wei Tsang Ooi
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
Wei Tsang Ooi
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
Wei Tsang Ooi
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
Wei Tsang Ooi
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
Wei Tsang Ooi
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
Wei Tsang Ooi
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
Wei Tsang Ooi
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
Wei Tsang Ooi
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
Wei Tsang Ooi
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
Wei Tsang Ooi
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
Wei Tsang Ooi
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet Routing
Wei Tsang Ooi
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
Wei Tsang Ooi
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
Wei Tsang Ooi
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
Wei Tsang Ooi
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
Wei Tsang Ooi
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
Wei Tsang Ooi
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic Analysis
Wei Tsang Ooi
 

Mais de Wei Tsang Ooi (20)

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
 
CS2106 Tutorial 2
CS2106 Tutorial 2CS2106 Tutorial 2
CS2106 Tutorial 2
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTube
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet Routing
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic Analysis
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

CS5229 09/10 Lecture 6: Simulation

  • 1. Methodologies for Networking Research 2 October 2009 CS5229, Semester 1, 2009/10 1
  • 2. Measurement" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 2
  • 3. “Reality Check” Are our assumptions reasonable? Is our mathematical model a good estimation of the real world? 2 October 2009 CS5229, Semester 1, 2009/10 3
  • 4. 2 October 2009 CS5229, Semester 1, 2009/10 5
  • 5. 2 October 2009 CS5229, Semester 1, 2009/10 6
  • 6. Experimentation" e.g., V. Jacobson. “Congestion Control and Avoidance" 2 October 2009 CS5229, Semester 1, 2009/10 7
  • 7. Deal with implementation issues Sometimes unforeseen complexities (e.g. own research experience in Unreliable TCP) 2 October 2009 CS5229, Semester 1, 2009/10 8
  • 8. Understand the Behavior of Systems Some systems are too complex to understand with “thought experiments” alone. 2 October 2009 CS5229, Semester 1, 2009/10 9
  • 9. 2 October 2009 CS5229, Semester 1, 2009/10 10
  • 10. 2 October 2009 CS5229, Semester 1, 2009/10 11
  • 11. Analysis" D. Chiu and R. Jain, "Analysis of the increase and decrease algorithms for congestion avoidance in computer networks,”" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 12
  • 12. Explore with Complete Control We can understand the basic forces that affect the system. e.g. TCP throughput is inversely propotional to √p 2 October 2009 CS5229, Semester 1, 2009/10 13
  • 13. Simplify complex systems But, if too simplified, important behavior could be missed (TCP throughput without timeout) 2 October 2009 CS5229, Semester 1, 2009/10 14
  • 14. Simulation" K. Fall and S. Floyd, "Simulation-based comparison of Tahoe, Reno, and SACK TCP,"" S. Floyd, V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," 2 October 2009 CS5229, Semester 1, 2009/10 15
  • 15. Check Correctness of Analysis If a simulation uses the same assumptions/model as the analysis, this simply verifies the correctness of the mathematical derivations. 2 October 2009 CS5229, Semester 1, 2009/10 16
  • 16. Check Correctness of Analysis Simulation can relax some assumptions, use more complex models, etc. to test the limits of analysis. (Real measurement/experiments still needed to check the usefulness of analysis results) 2 October 2009 CS5229, Semester 1, 2009/10 17
  • 17. Explore Complex Systems Some systems are too difficult/impossible to analyzed (e.g. Internet) 2 October 2009 CS5229, Semester 1, 2009/10 18
  • 18. Helps Develop Intuition" 2 October 2009 CS5229, Semester 1, 2009/10 19
  • 19. Measurement" Experimentation" Real World } Analysis" Simulation" } Abstract Model 2 October 2009 CS5229, Semester 1, 2009/10 20
  • 20. “Difficulties in Simulating the Internet” " Sally Floyd, Van Paxson" ACM/IEEE TON, 9(4) August 2001
  • 21. Why is Internet hard to simulate? 2 October 2009 CS5229, Semester 1, 2009/10 22
  • 22. 1.! Internet is diverse 2 October 2009 CS5229, Semester 1, 2009/10 23
  • 23. End-hosts: phones, desktops, servers, iPod, Wii 2 October 2009 CS5229, Semester 1, 2009/10 24
  • 24. Links: Ethernet, WiFi, Satellite, Dial-up, 3G 2 October 2009 CS5229, Semester 1, 2009/10 25
  • 25. Transport: TCP variants, UDP, DCCP 2 October 2009 CS5229, Semester 1, 2009/10 26
  • 26. Applications: games, videos, web, ftp, bittorrent 2 October 2009 CS5229, Semester 1, 2009/10 27
  • 27. 2.! Internet is huge 2 October 2009 CS5229, Semester 1, 2009/10 28
  • 28. 570,937,778 Number of Hosts as of July 2008 http://www.isc.org/index.pl?/ops/ds/host-count-history.php 2 October 2009 CS5229, Semester 1, 2009/10 29
  • 29. 681,064,561 Number of Hosts as of July 2009 https://www.isc.org/solutions/survey/history 2 October 2009 CS5229, Semester 1, 2009/10 30
  • 30. 3.! Internet is changing 2 October 2009 CS5229, Semester 1, 2009/10 31
  • 31. http://www.isc.org/ds/ 2 October 2009 CS5229, Semester 1, 2009/10 32
  • 32. 2 October 2009 CS5229, Semester 1, 2009/10 33 http://www.dtc.umn.edu/mints/
  • 33. Why is Internet hard to simulate?" 1. Heterogeneous " 2. Huge " 3. Changing 2 October 2009 CS5229, Semester 1, 2009/10 35
  • 34. What Internet topology should you use in your simulation? How are end hosts connected? What are the properties of the links? 2 October 2009 CS5229, Semester 1, 2009/10 38
  • 35. Topology changes constantly" Companies keep info secrets" Routes may change" Routes may be asymmetric 2 October 2009 CS5229, Semester 1, 2009/10 39
  • 36. You will need to simulate over a wide range of connectivity and link properties 2 October 2009 CS5229, Semester 1, 2009/10 40
  • 37. Which TCP version to use? 2 October 2009 CS5229, Semester 1, 2009/10 43
  • 38. Using “fingerprinting”, 831 different TCP implementations and versions are identified. 2 October 2009 CS5229, Semester 1, 2009/10 44
  • 39. Which to use? " Which to ignore? 2 October 2009 CS5229, Semester 1, 2009/10 45
  • 40. What applications to run? " What type of traffic to generate?" Telnet? FTP? Web? BitTorrent? Skype? 2 October 2009 CS5229, Semester 1, 2009/10 46
  • 41. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 47
  • 42. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 48
  • 43. Example from Sally Floyd: RED vs DropTail 2 October 2009 CS5229, Semester 1, 2009/10 49
  • 44. 2 October 2009 CS5229, Semester 1, 2009/10 50
  • 45. 2 October 2009 CS5229, Semester 1, 2009/10 51
  • 46. Example from Sally Floyd: TFRC for VoIP 2 October 2009 CS5229, Semester 1, 2009/10 52
  • 47. 2 October 2009 CS5229, Semester 1, 2009/10 53
  • 48. 2 October 2009 CS5229, Semester 1, 2009/10 54
  • 49. We can focus our simulation on dominant technology/application today.. 2 October 2009 CS5229, Semester 1, 2009/10 55
  • 50. TCP: NewReno SACKS" OS: Windows Linux" Applications: Web, FTP 2 October 2009 CS5229, Semester 1, 2009/10 56
  • 51. What about tomorrow? 2 October 2009 CS5229, Semester 1, 2009/10 57
  • 52. WiMax? " Sensors? " Virtual World?" DCCP? 2 October 2009 CS5229, Semester 1, 2009/10 58
  • 53. How to verify the simulation is correct? 2 October 2009 CS5229, Semester 1, 2009/10 60
  • 54. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 62
  • 55. 1. Diurnal Patterns 2 October 2009 CS5229, Semester 1, 2009/10 63
  • 56. 2 October 2009 CS5229, Semester 1, 2009/10 64
  • 57. hour #constrained
 ---- ------------
 00 139 2.5% -----------------------------------------------------X
 01 144 2.6% ------------------------------------------------------X
 02 146 2.6% -------------------------------------------------------X
 03 140 2.5% -----------------------------------------------------X
 04 119 2.1% ---------------------------------------------X
 05 89 1.6% ----------------------------------X
 06 69 1.2% --------------------------X
 07 55 1.0% ---------------------X
 08 45 0.8% -----------------X
 09 40 0.7% ---------------X
 10 40 0.7% ---------------X
 11 42 0.8% ----------------X
 12 51 0.9% -------------------X
 13 57 1.0% ---------------------X
 14 68 1.2% --------------------------X
 15 75 1.3% ----------------------------X
 16 77 1.4% -----------------------------X
 17 92 1.6% -----------------------------------X
 18 98 1.8% -------------------------------------X
 19 105 1.9% ----------------------------------------X
 20 108 1.9% -----------------------------------------X
 21 113 2.0% -------------------------------------------X
 22 124 2.2% -----------------------------------------------X
 23 134 2.4% ---------------------------------------------------X U Waterloo Data 24 Oct 2007 2 October 2009 CS5229, Semester 1, 2009/10 65
  • 58. 2. Self-Similar Traffic 2 October 2009 CS5229, Semester 1, 2009/10 66
  • 59. The traffic is bursty regardless of time scale 2 October 2009 CS5229, Semester 1, 2009/10 67
  • 60. Wikipedia 2 October 2009 CS5229, Semester 1, 2009/10 68
  • 61. 3. Poisson Session Arrival 2 October 2009 CS5229, Semester 1, 2009/10 69
  • 62. Remote logins, starting FTP, beginning of web surfing etc. 2 October 2009 CS5229, Semester 1, 2009/10 70
  • 63. (so are dead light bulbs, spelling mistakes, etc.) 2 October 2009 CS5229, Semester 1, 2009/10 71
  • 64. 4. Log-normal Duration 2 October 2009 CS5229, Semester 1, 2009/10 72
  • 65. 5. Heavy Tail Distributions 2 October 2009 CS5229, Semester 1, 2009/10 73
  • 66. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, by Mark E. Crovella and Azer Bestavros 2 October 2009 CS5229, Semester 1, 2009/10 74
  • 67. 1. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 75
  • 68. 2. Explore Parameter Space 2 October 2009 CS5229, Semester 1, 2009/10 76
  • 69. Change one parameter," fix the rest 2 October 2009 CS5229, Semester 1, 2009/10 77
  • 70. Explore a wide range of values 2 October 2009 CS5229, Semester 1, 2009/10 78
  • 71. 3. Use Traces 2 October 2009 CS5229, Semester 1, 2009/10 79
  • 72. e.g. collects traces of web sessions, video files, VoIP traffic 2 October 2009 CS5229, Semester 1, 2009/10 80
  • 73. Use it to simulate the traffic source 2 October 2009 CS5229, Semester 1, 2009/10 81
  • 74. But must be careful about traffic shaping and user/application adaptation. 2 October 2009 CS5229, Semester 1, 2009/10 82
  • 75. e.g. traces collected during non- congested time should not be use to simulate congested networks. 2 October 2009 CS5229, Semester 1, 2009/10 83
  • 76. 4. publish simulator script for others to verify 2 October 2009 CS5229, Semester 1, 2009/10 84
  • 77. Conclusion 2 October 2009 CS5229, Semester 1, 2009/10 85
  • 78. Simulation is useful but needs to do it properly 2 October 2009 CS5229, Semester 1, 2009/10 86
  • 79. Be careful about your simulation model: you want it to be as simple as possible, but not simpler. 2 October 2009 CS5229, Semester 1, 2009/10 87
  • 80. Be careful about your conclusion: “A is 13.5% better than B” is probably useless. 2 October 2009 CS5229, Semester 1, 2009/10 88
  • 81. “A is 13.5% better than B under these environment”" is better but not general 2 October 2009 CS5229, Semester 1, 2009/10 89
  • 82. Not really for quantitative results, but more for 2 October 2009 CS5229, Semester 1, 2009/10 90
  • 83. understanding the dynamics," illustrate a point," explore unexpected behavior. 2 October 2009 CS5229, Semester 1, 2009/10 91