Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints

A system and methods are disclosed that provide a continuous monitoring and diagnosis system for ISP IP/VPN backboneExt networks. The system includes two phases: 1) a monitor setup phase which selects candidate routers as monitors and the paths to be measured by the monitors, and 2) a continuous monitoring and diagnosis phase.

[1]  Christophe Diot,et al.  Reformulating the Monitor Placement Problem: Optimal Network-Wide Sampling , 2006 .

[2]  Noga Alon,et al.  Admission control to minimize rejections and online set cover with repetitions , 2005, SPAA '05.

[3]  Robert Nowak,et al.  Internet tomography , 2002, IEEE Signal Process. Mag..

[4]  Nick G. Duffield,et al.  Simple network performance tomography , 2003, IMC '03.

[5]  Donald F. Towsley,et al.  Multicast-based inference of network-internal loss characteristics , 1999, IEEE Trans. Inf. Theory.

[6]  Yin Zhang,et al.  NetQuest: a flexible framework for large-scale network measurement , 2009, TNET.

[7]  Mark Crovella,et al.  Efficient monitoring of end-to-end network properties , 2004, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Ritesh Kumar,et al.  Efficient beacon placement for network tomography , 2004, IMC '04.

[9]  Donald F. Towsley,et al.  Locating network monitors: complexity, heuristics, and coverage , 2005, INFOCOM.

[10]  Edward P. K. Tsang,et al.  Foundations of constraint satisfaction , 1993, Computation in cognitive science.

[11]  Walter Willinger,et al.  A first-principles approach to understanding the internet's router-level topology , 2004, SIGCOMM '04.

[12]  Yao Zhao,et al.  Towards unbiased end-to-end network diagnosis , 2009, TNET.

[13]  Ibrahim Matta,et al.  On the origin of power laws in Internet topologies , 2000, CCRV.

[14]  Feodor F. Dragan,et al.  Effective network monitoring , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[15]  Hanif D. Sherali,et al.  Linear Programming and Network Flows , 1977 .

[16]  Alejandro López-Ortiz,et al.  On the number of distributed measurement points for network tomography , 2003, IMC '03.

[17]  Vijay V. Vazirani,et al.  Approximation Algorithms , 2001, Springer Berlin Heidelberg.

[18]  Marina Thottan,et al.  Distributed network monitoring with bounded link utilization in IP networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  Donald F. Towsley,et al.  Network tomography on general topologies , 2002, SIGMETRICS '02.

[20]  Patrick Thiran,et al.  Active Measurement for Multiple Link Failures Diagnosis in IP Networks , 2004, PAM.

[21]  Yin Zhang,et al.  NetQuest: A Flexible Framework for Large-Scale Network Measurement , 2009, IEEE/ACM Transactions on Networking.

[22]  D. Hochbaum,et al.  Analysis of the greedy approach in problems of maximum k‐coverage , 1998 .

[23]  Helen J. Wang,et al.  Server-based inference of Internet link lossiness , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[24]  Walter Willinger,et al.  A first-principles approach to understanding the internet's router-level topology , 2004, SIGCOMM 2004.

[25]  R. Dechter to Constraint Satisfaction , 1991 .

[26]  Rajeev Motwani,et al.  Randomized algorithms , 1996, CSUR.

[27]  Michael G. Rabbat,et al.  Compressed network monitoring for ip and all-optical networks , 2007, IMC '07.

[28]  Donald F. Towsley,et al.  Inferring link loss using striped unicast probes , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[29]  Sushil Jajodia,et al.  Attack Graphs for Sensor Placement , Alert Prioritization , and Attack Response , 2008 .

[30]  Hervé Rivano,et al.  Optimal positioning of active and passive monitoring devices , 2005, CoNEXT '05.

[31]  Randy H. Katz,et al.  An algebraic approach to practical and scalable overlay network monitoring , 2004, SIGCOMM 2004.

[32]  Rajeev Rastogi,et al.  Robust Monitoring of Link Delays and Faults in IP Networks , 2003, IEEE/ACM Transactions on Networking.

[33]  Yin Zhang,et al.  On the constancy of internet path properties , 2001, IMW '01.

[34]  Rajeev Rastogi,et al.  Robust monitoring of link delays and faults in IP networks , 2006, IEEE/ACM Trans. Netw..

[35]  Tommy R. Jensen,et al.  Graph Coloring Problems , 1994 .

[36]  Randy H. Katz,et al.  Efficient and adaptive Web replication using content clustering , 2003, IEEE J. Sel. Areas Commun..

[37]  Philip K. McKinley,et al.  On the cost-quality tradeoff in topology-aware overlay path probing , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..