SlideShare uma empresa Scribd logo
1 de 83
Baixar para ler offline
Methodologies for
        Networking Research


2 October 2009
   CS5229, Semester 1, 2009/10
   1
Measurement"
     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”




2 October 2009
      CS5229, Semester 1, 2009/10
       2
“Reality Check”
     Are our assumptions reasonable? Is our
     mathematical model a good estimation of the
     real world? 



2 October 2009
    CS5229, Semester 1, 2009/10
    3
2 October 2009
   CS5229, Semester 1, 2009/10
   5
2 October 2009
   CS5229, Semester 1, 2009/10
   6
Experimentation"
                  
     e.g., V. Jacobson. “Congestion Control and
     Avoidance"




2 October 2009
       CS5229, Semester 1, 2009/10
   7
Deal with implementation
 issues
 Sometimes unforeseen complexities (e.g. own
 research experience in Unreliable TCP) 




2 October 2009
   CS5229, Semester 1, 2009/10
   8
Understand the
  Behavior of Systems
 Some systems are too complex to understand
 with “thought experiments” alone.




2 October 2009
   CS5229, Semester 1, 2009/10
   9
2 October 2009
   CS5229, Semester 1, 2009/10
   10
2 October 2009
   CS5229, Semester 1, 2009/10
   11
Analysis"
     D. Chiu and R. Jain, "Analysis of the increase and
     decrease algorithms for congestion avoidance in
     computer networks,”"

     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose

                           
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”


2 October 2009
       CS5229, Semester 1, 2009/10
        12
Explore with Complete
 Control
 We can understand the basic forces that affect
 the system. e.g. TCP throughput is inversely
 propotional to √p




2 October 2009
   CS5229, Semester 1, 2009/10
    13
Simplify complex
  systems
   But, if too simplified, important behavior could
   be missed (TCP throughput without timeout)




2 October 2009
    CS5229, Semester 1, 2009/10
      14
Simulation"
         K. Fall and S. Floyd, "Simulation-based
         comparison of Tahoe, Reno, and SACK TCP,""

         S. Floyd, V. Jacobson, "Random Early Detection
         Gateways for Congestion Avoidance,"




2 October 2009
        CS5229, Semester 1, 2009/10
       15
Check Correctness of
 Analysis
 If a simulation uses the same assumptions/model
 as the analysis, this simply verifies the
 correctness of the mathematical derivations.




2 October 2009
   CS5229, Semester 1, 2009/10
     16
Check Correctness of
 Analysis
 Simulation can relax some assumptions, use more
 complex models, etc. to test the limits of analysis.

 (Real measurement/experiments still needed to
 check the usefulness of analysis results)


2 October 2009
    CS5229, Semester 1, 2009/10
          17
Explore Complex
 Systems
 Some systems are too difficult/impossible to
 analyzed (e.g. Internet) 




2 October 2009
   CS5229, Semester 1, 2009/10
   18
Helps Develop Intuition"




2 October 2009
   CS5229, Semester 1, 2009/10
   19
Measurement"
    Experimentation" 
Real World
                                                 }
    Analysis"
    Simulation" 
             }
                  Abstract Model




2 October 2009
   CS5229, Semester 1, 2009/10
       20
“Difficulties in
Simulating the Internet” "
    Sally Floyd, Van Paxson"
                              
 ACM/IEEE TON, 9(4) August 2001
Why is Internet hard to
            simulate?


2 October 2009
   CS5229, Semester 1, 2009/10
   22
1.!
                  Internet is diverse

2 October 2009
        CS5229, Semester 1, 2009/10
   23
End-hosts: phones,
     desktops, servers, iPod, Wii



2 October 2009
   CS5229, Semester 1, 2009/10
   24
Links: Ethernet, WiFi,
     Satellite, Dial-up, 3G



2 October 2009
   CS5229, Semester 1, 2009/10
   25
Transport: TCP variants,
     UDP, DCCP



2 October 2009
   CS5229, Semester 1, 2009/10
   26
Applications: games,
     videos, web, ftp, bittorrent 



2 October 2009
   CS5229, Semester 1, 2009/10
   27
2.!
                  Internet is huge

2 October 2009
      CS5229, Semester 1, 2009/10
   28
570,937,778
                   Number of Hosts as of July 2008
      http://www.isc.org/index.pl?/ops/ds/host-count-history.php




2 October 2009
         CS5229, Semester 1, 2009/10
                29
681,064,561
                        Number of Hosts as of July 2009
                  https://www.isc.org/solutions/survey/history




2 October 2009
              CS5229, Semester 1, 2009/10
         30
3.!
           Internet is changing

2 October 2009
   CS5229, Semester 1, 2009/10
   31
http://www.isc.org/ds/
2 October 2009
    CS5229, Semester 1, 2009/10
   32
2 October 2009
        CS5229, Semester 1, 2009/10
   33
                  http://www.dtc.umn.edu/mints/
Why is Internet hard to
     simulate?"

     1. Heterogeneous "
     2. Huge "
     3. Changing
2 October 2009
   CS5229, Semester 1, 2009/10
   35
What Internet topology
     should you use in your
     simulation?
     How are end hosts connected? What are the
     properties of the links?




2 October 2009
     CS5229, Semester 1, 2009/10
   38
Topology changes constantly"
 Companies keep info secrets"
 Routes may change"
 Routes may be asymmetric

2 October 2009
   CS5229, Semester 1, 2009/10
   39
You will need to simulate over
     a wide range of connectivity
     and link properties



2 October 2009
   CS5229, Semester 1, 2009/10
   40
Which TCP version to
     use?


2 October 2009
   CS5229, Semester 1, 2009/10
   43
Using “fingerprinting”,
     831 different TCP
     implementations and
     versions are identified.

2 October 2009
   CS5229, Semester 1, 2009/10
   44
Which to use? "
     Which to ignore? 


2 October 2009
   CS5229, Semester 1, 2009/10
   45
What applications to run? "

     What type of traffic to generate?"

     Telnet? FTP? Web? BitTorrent?
     Skype? 

2 October 2009
   CS5229, Semester 1, 2009/10
   46
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   47
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   48
Example from Sally Floyd:
RED vs DropTail


2 October 2009
   CS5229, Semester 1, 2009/10
   49
2 October 2009
   CS5229, Semester 1, 2009/10
   50
2 October 2009
   CS5229, Semester 1, 2009/10
   51
Example from Sally Floyd:
TFRC for VoIP


2 October 2009
   CS5229, Semester 1, 2009/10
   52
2 October 2009
   CS5229, Semester 1, 2009/10
   53
2 October 2009
   CS5229, Semester 1, 2009/10
   54
We can focus our
     simulation on dominant
     technology/application
     today..

2 October 2009
   CS5229, Semester 1, 2009/10
   55
TCP: NewReno SACKS"
     OS: Windows Linux"
     Applications: Web, FTP

2 October 2009
   CS5229, Semester 1, 2009/10
   56
What about tomorrow?


2 October 2009
   CS5229, Semester 1, 2009/10
   57
WiMax? "
     Sensors? "
     Virtual World?"
     DCCP?

2 October 2009
   CS5229, Semester 1, 2009/10
   58
How to verify the
    simulation is correct?


2 October 2009
   CS5229, Semester 1, 2009/10
   60
Looking for
                   Invariants


2 October 2009
     CS5229, Semester 1, 2009/10
   62
1. Diurnal Patterns


2 October 2009
   CS5229, Semester 1, 2009/10
   63
2 October 2009
   CS5229, Semester 1, 2009/10
   64
hour #constrained

---- ------------

  00   139   2.5%    -----------------------------------------------------X

  01   144   2.6%    ------------------------------------------------------X

  02   146   2.6%    -------------------------------------------------------X

  03   140   2.5%    -----------------------------------------------------X

  04   119   2.1%    ---------------------------------------------X

  05    89   1.6%    ----------------------------------X

  06    69   1.2%    --------------------------X

  07    55   1.0%    ---------------------X

  08    45   0.8%    -----------------X

  09    40   0.7%    ---------------X

  10    40   0.7%    ---------------X

  11    42   0.8%    ----------------X

  12    51   0.9%    -------------------X

  13    57   1.0%    ---------------------X

  14    68   1.2%    --------------------------X

  15    75   1.3%    ----------------------------X

  16    77   1.4%    -----------------------------X

  17    92   1.6%    -----------------------------------X

  18    98   1.8%    -------------------------------------X

  19   105   1.9%    ----------------------------------------X

  20   108   1.9%    -----------------------------------------X

  21   113   2.0%    -------------------------------------------X

  22   124   2.2%    -----------------------------------------------X

  23   134   2.4%    ---------------------------------------------------X	



                      U Waterloo Data 24 Oct 2007
2 October 2009
               CS5229, Semester 1, 2009/10
                       65
2. Self-Similar Traffic


2 October 2009
   CS5229, Semester 1, 2009/10
   66
The traffic is bursty
    regardless of time scale


2 October 2009
   CS5229, Semester 1, 2009/10
   67
Wikipedia

2 October 2009
   CS5229, Semester 1, 2009/10
   68
3. Poisson Session
                   Arrival


2 October 2009
   CS5229, Semester 1, 2009/10
   69
Remote logins, starting
     FTP, beginning of web
          surfing etc.

2 October 2009
   CS5229, Semester 1, 2009/10
   70
(so are dead light bulbs,
     spelling mistakes, etc.)


2 October 2009
   CS5229, Semester 1, 2009/10
   71
4. Log-normal Duration


2 October 2009
   CS5229, Semester 1, 2009/10
   72
5. Heavy Tail
                  Distributions


2 October 2009
     CS5229, Semester 1, 2009/10
   73
Self-Similarity in World Wide Web Traffic: Evidence and Possible
      Causes, by Mark E. Crovella and Azer Bestavros
2 October 2009
          CS5229, Semester 1, 2009/10
               74
1. Looking for
                    Invariants


2 October 2009
      CS5229, Semester 1, 2009/10
   75
2. Explore Parameter
              Space


2 October 2009
   CS5229, Semester 1, 2009/10
   76
Change one parameter,"
                       fix the rest



2 October 2009
        CS5229, Semester 1, 2009/10
   77
Explore a wide range of values




2 October 2009
   CS5229, Semester 1, 2009/10
   78
3. Use Traces


2 October 2009
     CS5229, Semester 1, 2009/10
   79
e.g. collects traces of web
     sessions, video files, VoIP traffic



2 October 2009
   CS5229, Semester 1, 2009/10
   80
Use it to simulate the traffic
                      source



2 October 2009
    CS5229, Semester 1, 2009/10
   81
But must be careful about traffic
     shaping and user/application
              adaptation. 



2 October 2009
   CS5229, Semester 1, 2009/10
   82
e.g. traces collected during non-
congested time should not be use to
   simulate congested networks. 



2 October 2009
   CS5229, Semester 1, 2009/10
   83
4. publish simulator script for
                 others to verify



2 October 2009
   CS5229, Semester 1, 2009/10
   84
Conclusion


2 October 2009
    CS5229, Semester 1, 2009/10
   85
Simulation is useful but needs to
             do it properly



2 October 2009
   CS5229, Semester 1, 2009/10
   86
Be careful about your simulation
  model: you want it to be as simple
    as possible, but not simpler.



2 October 2009
   CS5229, Semester 1, 2009/10
   87
Be careful about your conclusion:
     “A is 13.5% better than B” is
           probably useless.



2 October 2009
   CS5229, Semester 1, 2009/10
   88
“A is 13.5% better than B under
             these environment”"
          is better but not general



2 October 2009
   CS5229, Semester 1, 2009/10
   89
Not really for quantitative results,
               but more for



2 October 2009
   CS5229, Semester 1, 2009/10
   90
understanding the dynamics,"
illustrate a point,"
explore unexpected behavior.



2 October 2009
   CS5229, Semester 1, 2009/10
   91

Mais conteúdo relacionado

Semelhante a CS5229 09/10 Lecture 6: Simulation

Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the Internet
Wei Tsang Ooi
 
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
Wei Tsang Ooi
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the Internet
Wei Tsang Ooi
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
Videoguy
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Benjamin Cabé
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
Benjamin Cabé
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle years
Alan Quayle
 

Semelhante a CS5229 09/10 Lecture 6: Simulation (20)

Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the Internet
 
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the Internet
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
Cse 318  Project Report on Goethe Institut Bangladesh Network DesignCse 318  Project Report on Goethe Institut Bangladesh Network Design
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Linking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code ArtifactsLinking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code Artifacts
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
Symfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo PragueSymfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo Prague
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
 
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdfA Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
 
Lecture 5: RED
Lecture 5: REDLecture 5: RED
Lecture 5: RED
 
Introduction to Building Communication Protocols
Introduction to Building Communication Protocols Introduction to Building Communication Protocols
Introduction to Building Communication Protocols
 
Nido
NidoNido
Nido
 
My Name is E & Open Standards
My Name is E & Open StandardsMy Name is E & Open Standards
My Name is E & Open Standards
 
Developer Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundationDeveloper Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundation
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle years
 

Mais de Wei Tsang Ooi

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
Wei Tsang Ooi
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
Wei Tsang Ooi
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
Wei Tsang Ooi
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
Wei Tsang Ooi
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
Wei Tsang Ooi
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
Wei Tsang Ooi
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
Wei Tsang Ooi
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
Wei Tsang Ooi
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
Wei Tsang Ooi
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
Wei Tsang Ooi
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
Wei Tsang Ooi
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
Wei Tsang Ooi
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
Wei Tsang Ooi
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
Wei Tsang Ooi
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
Wei Tsang Ooi
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
Wei Tsang Ooi
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic Analysis
Wei Tsang Ooi
 
CS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet TopologyCS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet Topology
Wei Tsang Ooi
 

Mais de Wei Tsang Ooi (20)

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
 
CS2106 Tutorial 2
CS2106 Tutorial 2CS2106 Tutorial 2
CS2106 Tutorial 2
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTube
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic Analysis
 
CS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet TopologyCS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet Topology
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

CS5229 09/10 Lecture 6: Simulation

  • 1. Methodologies for Networking Research 2 October 2009 CS5229, Semester 1, 2009/10 1
  • 2. Measurement" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 2
  • 3. “Reality Check” Are our assumptions reasonable? Is our mathematical model a good estimation of the real world? 2 October 2009 CS5229, Semester 1, 2009/10 3
  • 4. 2 October 2009 CS5229, Semester 1, 2009/10 5
  • 5. 2 October 2009 CS5229, Semester 1, 2009/10 6
  • 6. Experimentation" e.g., V. Jacobson. “Congestion Control and Avoidance" 2 October 2009 CS5229, Semester 1, 2009/10 7
  • 7. Deal with implementation issues Sometimes unforeseen complexities (e.g. own research experience in Unreliable TCP) 2 October 2009 CS5229, Semester 1, 2009/10 8
  • 8. Understand the Behavior of Systems Some systems are too complex to understand with “thought experiments” alone. 2 October 2009 CS5229, Semester 1, 2009/10 9
  • 9. 2 October 2009 CS5229, Semester 1, 2009/10 10
  • 10. 2 October 2009 CS5229, Semester 1, 2009/10 11
  • 11. Analysis" D. Chiu and R. Jain, "Analysis of the increase and decrease algorithms for congestion avoidance in computer networks,”" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 12
  • 12. Explore with Complete Control We can understand the basic forces that affect the system. e.g. TCP throughput is inversely propotional to √p 2 October 2009 CS5229, Semester 1, 2009/10 13
  • 13. Simplify complex systems But, if too simplified, important behavior could be missed (TCP throughput without timeout) 2 October 2009 CS5229, Semester 1, 2009/10 14
  • 14. Simulation" K. Fall and S. Floyd, "Simulation-based comparison of Tahoe, Reno, and SACK TCP,"" S. Floyd, V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," 2 October 2009 CS5229, Semester 1, 2009/10 15
  • 15. Check Correctness of Analysis If a simulation uses the same assumptions/model as the analysis, this simply verifies the correctness of the mathematical derivations. 2 October 2009 CS5229, Semester 1, 2009/10 16
  • 16. Check Correctness of Analysis Simulation can relax some assumptions, use more complex models, etc. to test the limits of analysis. (Real measurement/experiments still needed to check the usefulness of analysis results) 2 October 2009 CS5229, Semester 1, 2009/10 17
  • 17. Explore Complex Systems Some systems are too difficult/impossible to analyzed (e.g. Internet) 2 October 2009 CS5229, Semester 1, 2009/10 18
  • 18. Helps Develop Intuition" 2 October 2009 CS5229, Semester 1, 2009/10 19
  • 19. Measurement" Experimentation" Real World } Analysis" Simulation" } Abstract Model 2 October 2009 CS5229, Semester 1, 2009/10 20
  • 20. “Difficulties in Simulating the Internet” " Sally Floyd, Van Paxson" ACM/IEEE TON, 9(4) August 2001
  • 21. Why is Internet hard to simulate? 2 October 2009 CS5229, Semester 1, 2009/10 22
  • 22. 1.! Internet is diverse 2 October 2009 CS5229, Semester 1, 2009/10 23
  • 23. End-hosts: phones, desktops, servers, iPod, Wii 2 October 2009 CS5229, Semester 1, 2009/10 24
  • 24. Links: Ethernet, WiFi, Satellite, Dial-up, 3G 2 October 2009 CS5229, Semester 1, 2009/10 25
  • 25. Transport: TCP variants, UDP, DCCP 2 October 2009 CS5229, Semester 1, 2009/10 26
  • 26. Applications: games, videos, web, ftp, bittorrent 2 October 2009 CS5229, Semester 1, 2009/10 27
  • 27. 2.! Internet is huge 2 October 2009 CS5229, Semester 1, 2009/10 28
  • 28. 570,937,778 Number of Hosts as of July 2008 http://www.isc.org/index.pl?/ops/ds/host-count-history.php 2 October 2009 CS5229, Semester 1, 2009/10 29
  • 29. 681,064,561 Number of Hosts as of July 2009 https://www.isc.org/solutions/survey/history 2 October 2009 CS5229, Semester 1, 2009/10 30
  • 30. 3.! Internet is changing 2 October 2009 CS5229, Semester 1, 2009/10 31
  • 31. http://www.isc.org/ds/ 2 October 2009 CS5229, Semester 1, 2009/10 32
  • 32. 2 October 2009 CS5229, Semester 1, 2009/10 33 http://www.dtc.umn.edu/mints/
  • 33. Why is Internet hard to simulate?" 1. Heterogeneous " 2. Huge " 3. Changing 2 October 2009 CS5229, Semester 1, 2009/10 35
  • 34. What Internet topology should you use in your simulation? How are end hosts connected? What are the properties of the links? 2 October 2009 CS5229, Semester 1, 2009/10 38
  • 35. Topology changes constantly" Companies keep info secrets" Routes may change" Routes may be asymmetric 2 October 2009 CS5229, Semester 1, 2009/10 39
  • 36. You will need to simulate over a wide range of connectivity and link properties 2 October 2009 CS5229, Semester 1, 2009/10 40
  • 37. Which TCP version to use? 2 October 2009 CS5229, Semester 1, 2009/10 43
  • 38. Using “fingerprinting”, 831 different TCP implementations and versions are identified. 2 October 2009 CS5229, Semester 1, 2009/10 44
  • 39. Which to use? " Which to ignore? 2 October 2009 CS5229, Semester 1, 2009/10 45
  • 40. What applications to run? " What type of traffic to generate?" Telnet? FTP? Web? BitTorrent? Skype? 2 October 2009 CS5229, Semester 1, 2009/10 46
  • 41. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 47
  • 42. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 48
  • 43. Example from Sally Floyd: RED vs DropTail 2 October 2009 CS5229, Semester 1, 2009/10 49
  • 44. 2 October 2009 CS5229, Semester 1, 2009/10 50
  • 45. 2 October 2009 CS5229, Semester 1, 2009/10 51
  • 46. Example from Sally Floyd: TFRC for VoIP 2 October 2009 CS5229, Semester 1, 2009/10 52
  • 47. 2 October 2009 CS5229, Semester 1, 2009/10 53
  • 48. 2 October 2009 CS5229, Semester 1, 2009/10 54
  • 49. We can focus our simulation on dominant technology/application today.. 2 October 2009 CS5229, Semester 1, 2009/10 55
  • 50. TCP: NewReno SACKS" OS: Windows Linux" Applications: Web, FTP 2 October 2009 CS5229, Semester 1, 2009/10 56
  • 51. What about tomorrow? 2 October 2009 CS5229, Semester 1, 2009/10 57
  • 52. WiMax? " Sensors? " Virtual World?" DCCP? 2 October 2009 CS5229, Semester 1, 2009/10 58
  • 53. How to verify the simulation is correct? 2 October 2009 CS5229, Semester 1, 2009/10 60
  • 54. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 62
  • 55. 1. Diurnal Patterns 2 October 2009 CS5229, Semester 1, 2009/10 63
  • 56. 2 October 2009 CS5229, Semester 1, 2009/10 64
  • 57. hour #constrained
 ---- ------------
 00 139 2.5% -----------------------------------------------------X
 01 144 2.6% ------------------------------------------------------X
 02 146 2.6% -------------------------------------------------------X
 03 140 2.5% -----------------------------------------------------X
 04 119 2.1% ---------------------------------------------X
 05 89 1.6% ----------------------------------X
 06 69 1.2% --------------------------X
 07 55 1.0% ---------------------X
 08 45 0.8% -----------------X
 09 40 0.7% ---------------X
 10 40 0.7% ---------------X
 11 42 0.8% ----------------X
 12 51 0.9% -------------------X
 13 57 1.0% ---------------------X
 14 68 1.2% --------------------------X
 15 75 1.3% ----------------------------X
 16 77 1.4% -----------------------------X
 17 92 1.6% -----------------------------------X
 18 98 1.8% -------------------------------------X
 19 105 1.9% ----------------------------------------X
 20 108 1.9% -----------------------------------------X
 21 113 2.0% -------------------------------------------X
 22 124 2.2% -----------------------------------------------X
 23 134 2.4% ---------------------------------------------------X U Waterloo Data 24 Oct 2007 2 October 2009 CS5229, Semester 1, 2009/10 65
  • 58. 2. Self-Similar Traffic 2 October 2009 CS5229, Semester 1, 2009/10 66
  • 59. The traffic is bursty regardless of time scale 2 October 2009 CS5229, Semester 1, 2009/10 67
  • 60. Wikipedia 2 October 2009 CS5229, Semester 1, 2009/10 68
  • 61. 3. Poisson Session Arrival 2 October 2009 CS5229, Semester 1, 2009/10 69
  • 62. Remote logins, starting FTP, beginning of web surfing etc. 2 October 2009 CS5229, Semester 1, 2009/10 70
  • 63. (so are dead light bulbs, spelling mistakes, etc.) 2 October 2009 CS5229, Semester 1, 2009/10 71
  • 64. 4. Log-normal Duration 2 October 2009 CS5229, Semester 1, 2009/10 72
  • 65. 5. Heavy Tail Distributions 2 October 2009 CS5229, Semester 1, 2009/10 73
  • 66. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, by Mark E. Crovella and Azer Bestavros 2 October 2009 CS5229, Semester 1, 2009/10 74
  • 67. 1. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 75
  • 68. 2. Explore Parameter Space 2 October 2009 CS5229, Semester 1, 2009/10 76
  • 69. Change one parameter," fix the rest 2 October 2009 CS5229, Semester 1, 2009/10 77
  • 70. Explore a wide range of values 2 October 2009 CS5229, Semester 1, 2009/10 78
  • 71. 3. Use Traces 2 October 2009 CS5229, Semester 1, 2009/10 79
  • 72. e.g. collects traces of web sessions, video files, VoIP traffic 2 October 2009 CS5229, Semester 1, 2009/10 80
  • 73. Use it to simulate the traffic source 2 October 2009 CS5229, Semester 1, 2009/10 81
  • 74. But must be careful about traffic shaping and user/application adaptation. 2 October 2009 CS5229, Semester 1, 2009/10 82
  • 75. e.g. traces collected during non- congested time should not be use to simulate congested networks. 2 October 2009 CS5229, Semester 1, 2009/10 83
  • 76. 4. publish simulator script for others to verify 2 October 2009 CS5229, Semester 1, 2009/10 84
  • 77. Conclusion 2 October 2009 CS5229, Semester 1, 2009/10 85
  • 78. Simulation is useful but needs to do it properly 2 October 2009 CS5229, Semester 1, 2009/10 86
  • 79. Be careful about your simulation model: you want it to be as simple as possible, but not simpler. 2 October 2009 CS5229, Semester 1, 2009/10 87
  • 80. Be careful about your conclusion: “A is 13.5% better than B” is probably useless. 2 October 2009 CS5229, Semester 1, 2009/10 88
  • 81. “A is 13.5% better than B under these environment”" is better but not general 2 October 2009 CS5229, Semester 1, 2009/10 89
  • 82. Not really for quantitative results, but more for 2 October 2009 CS5229, Semester 1, 2009/10 90
  • 83. understanding the dynamics," illustrate a point," explore unexpected behavior. 2 October 2009 CS5229, Semester 1, 2009/10 91