The STRESS method for boundary-point performance analysis of end-to-end multicast timer-suppression mechanisms

The advent of multicast and the growth and complexity of the Internet has complicated network protocol design and evaluation. Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such an approach may be useful for average case analysis but does not cover boundary-point (worst or best case) scenarios. To synthesize boundary-point scenarios, a more systematic approach is needed. In this paper, we present a method for automatic synthesis of worst and best case scenarios for protocol boundary-point evaluation. Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and system state space to synthesize these scenarios. The algorithm is based on a global finite state machine (FSM) model. We extend the algorithm with timing semantics to handle end-to-end delays and address performance criteria. We introduce the notion of a virtual LAN to represent delays of the underlying multicast distribution tree. Our algorithms utilize implicit backward search using branch and bound techniques and start from given target events. As a case study, we use our method to evaluate variants of the timer suppression mechanism, used in various multicast protocols, with respect to two performance criteria: overhead of response messages and response time. Simulation results for reliable multicast protocols show that our method provides a scalable way for synthesizing worst case scenarios automatically. Results obtained using stress scenarios differ dramatically from those obtained through average case analyses. We hope for our method to serve as a model for applying systematic evaluation to other multicast protocols.

[1]  DuboisMichel,et al.  Verification techniques for cache coherence protocols , 1997 .

[2]  Satish Kumar,et al.  Virtual InterNetwork Testbed: Status and Research Agenda , 1998 .

[3]  Marc White,et al.  StarBurst Multicast File Transfer Protocol (MFTP) Specification , 1998 .

[4]  Narendra Karmarkar,et al.  A new polynomial-time algorithm for linear programming , 1984, Comb..

[5]  David Thaler,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.

[6]  Krishan K. Sabnani,et al.  A new technique for generating protocol test , 1985, SIGCOMM.

[7]  Melvin A. Breuer,et al.  Digital systems testing and testable design , 1990 .

[8]  David Lee,et al.  Testing finite state machines , 1991, STOC '91.

[9]  Krishan K. Sabnani,et al.  A Protocol Test Generation Procedure , 1988, Comput. Networks.

[10]  Michel Dubois,et al.  Verification techniques for cache coherence protocols , 1997, CSUR.

[11]  Robert S. Boyer,et al.  A computational logic handbook , 1979, Perspectives in computing.

[12]  D. Rayner OSI Conformance Testing , 1987, Comput. Networks.

[13]  Ahmed Helmy,et al.  Systematic testing of protocol robustness: case studies on mobile IP and MARS , 2000, Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000.

[14]  John E. Mitchell,et al.  An improved branch and bound algorithm for mixed integer nonlinear programs , 1994, Comput. Oper. Res..

[15]  J. William Atwood,et al.  Reliable multicasting in the Xpress transport protocol , 1996, Proceedings of LCN - 21st Annual Conference on Local Computer Networks.

[16]  Deborah Estrin,et al.  Network Visualization with the VINT Network Animator Nam , 1999 .

[17]  Deborah Estrin,et al.  Scalable Coordination in Sensor Networks , 1999, MobiCom 1999.

[18]  Deborah Estrin,et al.  Protocol independent multicast-dense mode (pim-dm): protocol specification , 1996 .

[19]  Deborah Estrin,et al.  Enabling large-scale simulations: selective abstraction approach to the study of multicast protocols , 1998, Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247).

[20]  David Lee,et al.  Testing Finite State Machines: Fault Detection , 1995, J. Comput. Syst. Sci..

[21]  Ming T. Liu,et al.  Protocol verification using reachability analysis: the state space explosion problem and relief strategies , 1987, Computer Communication Review.

[22]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[23]  Kenneth L. Calvert,et al.  Modeling Internet topology , 1997, IEEE Commun. Mag..

[24]  Karim Seada,et al.  Systematic Evaluation of Multicast Congestion Control Protocols , 2002 .

[25]  Deborah Estrin,et al.  Impact of network dynamics on end-to-end protocols: case studies in reliable multicast , 1998, Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166).

[26]  Van Jacobson,et al.  Adaptive web caching: towards a new global caching architecture , 1998, Comput. Networks.

[27]  Deborah Estrin,et al.  Fault isolation in multicast trees , 2000, SIGCOMM.

[28]  George B. Dantzig,et al.  Simplex Method for Solving Linear Programs , 1987 .

[29]  J. Michael Spivey,et al.  Understanding Z : A specification language and its formal semantics , 1985, Cambridge tracts in theoretical computer science.

[30]  Krishan K. Sabnani,et al.  A new technique for generating protocol test , 1985, SIGCOMM 1985.

[31]  William C. Fenner Internet Group Management Protocol, Version 2 , 1997, RFC.

[32]  ZHANGLi-xia,et al.  A reliable multicast framework for light-weight sessions and application level framing , 1995 .

[33]  Deborah Estrin,et al.  Network Visualization with Nam, the VINT Network Animator , 2000, Computer.

[34]  I. Ahmad,et al.  Recovery Approach to the Design of Stabilizing Communication Protocols , 1995, Comput. Commun..

[35]  Brad Cain,et al.  Internet Group Management Protocol, Version 3 , 2002, RFC.

[36]  Edmund M. Clarke,et al.  Formal Methods: State of the Art and Future Directions Working Group Members , 1996 .

[37]  Deborah Estrin,et al.  Large-Scale Weakly Consistent Replication using Multicast , 1998 .

[38]  Steven McCanne,et al.  An active service framework and its application to real-time multimedia transcoding , 1998, SIGCOMM '98.

[39]  Mark Handley,et al.  Protocol Independent Multicast{Sparse Mode (PIM-SM): Motivation and Architecture , 1997 .

[40]  Scott Shenker,et al.  A scalable Web cache consistency architecture , 1999, SIGCOMM '99.

[41]  Deborah Estrin,et al.  Systematic testing of multicast routing protocols: analysis of forward and backward search techniques , 2000, Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440).

[42]  Mark Handley,et al.  Session directories and scalable Internet multicast address allocation , 1998, SIGCOMM '98.

[43]  Deborah Estrin,et al.  Advances in network simulation , 2000, Computer.

[44]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[45]  Deborah Estrin,et al.  Fault-oriented Test Generation for Multicast Routing Protocol Design , 1998, FORTE.

[46]  Patrice Godefroid,et al.  Using Partial Orders to Improve Automatic Verification Methods , 1990, CAV.

[47]  Patrice Godefroid Using Partial Orders to Improve Automatic Verification Methods , 1990, CAV.

[48]  Ahmed Helmy,et al.  A framework for systematic evaluation of multicast congestion control protocols , 2004, IEEE Journal on Selected Areas in Communications.

[49]  Ahmed Helmy,et al.  Fairness evaluation experiments for multicast congestion control protocols , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[50]  Deborah Estrin,et al.  Simulation-based 'STRESS' testing case study: a multicast routing protocol , 1998, Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247).