Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring

Network tomography using end-to-end probes provides a powerful tool for monitoring the performance of internal network elements. However, active probing can generate tremendous traffic, which degrades the overall network performance. Meanwhile, not all the probing paths contain useful information for identifying the link metrics of interest. This observation motivates us to study the optimal selection of monitoring paths to balance identifiability and probing cost. Assuming additive link metrics (e.g., delays), we consider four closely-related optimization problems: 1) Max-ILCost that maximizes the number of identifiable links under a probing budget, 2) Max-Rank-Cost that maximizes the rank of selected paths under a probing budget, 3) Min-Cost-IL that minimizes the probing cost while preserving identifiability, and 4) Min-Cost-Rank that minimizes the probing cost while preserving rank. While (1) and (3) are hard to solve, (2) and (4) are easy to solve, and the solutions give a good approximation for (1) and (3). Specifically, we provide an optimal algorithm for (4) and a (1?1/e)-approximation algorithm for (2). We prove that the solution for (4) provides tight upper/lower bounds on the minimum cost of (3), and the solution for (2) provides upper/lower bounds on the maximum identifiability of (1). Our evaluations on real topologies show that solutions to the rank-based optimization (2, 4) have superior performance in terms of the objectives of the identifiability-based optimization (1, 3), and our solutions can reduce the total probing cost by an order of magnitude while achieving the same monitoring performance.

[1]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[2]  Nick Feamster,et al.  Measuring the effects of internet path faults on reactive routing , 2003, SIGMETRICS '03.

[3]  James G. Oxley,et al.  Matroid theory , 1992 .

[4]  R. Kumar,et al.  Practical Beacon Placement for Link Monitoring Using Network Tomography , 2006, IEEE Journal on Selected Areas in Communications.

[5]  Thomas F. La Porta,et al.  Service Placement for Detecting and Localizing Failures Using End-to-End Observations , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[6]  Abishek Gopalan,et al.  On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths , 2012, IEEE/ACM Transactions on Networking.

[7]  Matthew Roughan,et al.  The Internet Topology Zoo , 2011, IEEE Journal on Selected Areas in Communications.

[8]  Don Towsley,et al.  The use of end-to-end multicast measurements for characterizing internal network behavior , 2000, IEEE Commun. Mag..

[9]  Thomas F. La Porta,et al.  Network recovery from massive failures under uncertain knowledge of damages , 2017, 2017 IFIP Networking Conference (IFIP Networking) and Workshops.

[10]  Kin K. Leung,et al.  Efficient Identification of Additive Link Metrics via Network Tomography , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[11]  Rajeev Rastogi,et al.  Robust Monitoring of Link Delays and Faults in IP Networks , 2003, IEEE/ACM Transactions on Networking.

[12]  Vern Paxson,et al.  End-to-end routing behavior in the Internet , 1996, TNET.

[13]  Samir Khuller,et al.  The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..

[14]  Kin K. Leung,et al.  Inferring Link Metrics From End-To-End Path Measurements: Identifiability and Monitor Placement , 2014, IEEE/ACM Transactions on Networking.

[15]  Fei Li,et al.  End-to-End Service Quality Measurement Using Source-Routed Probes , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[16]  Satoru Fujishige,et al.  Submodular functions and optimization , 1991 .

[17]  David D. Clark,et al.  Challenges in Inferring Internet Interdomain Congestion , 2014, Internet Measurement Conference.

[18]  Dorit S. Hochbaum,et al.  Approximation Algorithms for the Set Covering and Vertex Cover Problems , 1982, SIAM J. Comput..

[19]  William Stallings,et al.  SNMP and SNMPv2: the infrastructure for network management , 1998, IEEE Commun. Mag..

[20]  Kazuo Murota,et al.  Matrices and Matroids for Systems Analysis , 2000 .

[21]  George L. Nemhauser,et al.  Constraint classification for mixed integer programming formulations , 1991 .

[22]  G. Strang Introduction to Linear Algebra , 1993 .

[23]  J. Kruskal On the shortest spanning subtree of a graph and the traveling salesman problem , 1956 .

[24]  Randy H. Katz,et al.  An algebraic approach to practical and scalable overlay network monitoring , 2004, SIGCOMM 2004.

[25]  Mohammad Reza Aref,et al.  Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[26]  Qiang Zheng,et al.  Minimizing Probing Cost and Achieving Identifiability in Probe-Based Network Link Monitoring , 2013, IEEE Transactions on Computers.

[27]  Mohammad Reza Aref,et al.  Risk of attack coefficient effect on availability of Ad-hoc networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[28]  Thomas F. La Porta,et al.  Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[29]  Y. Vardi,et al.  Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data , 1996 .