Topology Agnostic Bounds on Minimum Requirements for Network Failure Identification

In Boolean Network Tomography (BNT), node identifiability is a crucial property that reflects the possibility of unambiguously classifying the state of the nodes of a network as ’working’ or ’failed’ through end-to-end measurement paths. Designing a monitoring scheme satisfying network identifiability is an NP problem. In this article, we provide theoretical bounds on the minimum number of necessary measurement paths to guarantee identifiability of a given number of nodes. The bounds take into consideration two different classes of routing schemes (arbitrary and consistent routing) as well as quality of service (QoS) requirements. We formally prove the tightness of such bounds for the arbitrary routing scheme, and provide an algorithmic approach to the design of network topologies and path deployment that meet the discussed limits. Due to the computational complexity of the optimal solution, We evaluate the tightness of our lower bounds by comparing their values with an upper bound, obtained by a state-of-the-art heuristic for node identifiability. For our experiments we run extensive simulations on both synthetic and real network topologies, for which we show that the two bounds are close to each other, despite the fact that the provided lower bounds are topology agnostic.

[1]  Rajeev Rastogi,et al.  Robust Monitoring of Link Delays and Faults in IP Networks , 2003, IEEE/ACM Transactions on Networking.

[2]  Don Towsley,et al.  The use of end-to-end multicast measurements for characterizing internal network behavior , 2000, IEEE Commun. Mag..

[3]  Matthew Roughan,et al.  The Internet Topology Zoo , 2011, IEEE Journal on Selected Areas in Communications.

[4]  Ting He,et al.  Fundamental limits of failure identifiability by boolean network tomography , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[5]  Nick G. Duffield,et al.  Simple network performance tomography , 2003, IMC '03.

[6]  Piyush Gupta,et al.  Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .

[7]  Nick G. Duffield,et al.  Network Tomography of Binary Network Performance Characteristics , 2006, IEEE Transactions on Information Theory.

[8]  Shengli Pan,et al.  A ${Q}$ -Learning Based Framework for Congested Link Identification , 2019, IEEE Internet of Things Journal.

[9]  Ryu Miura,et al.  Adaptive boolean network tomography for link failure detection , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[10]  Annalisa Massini,et al.  On Fundamental Bounds of Failure Identifiability by Boolean Network Tomography , 2019, ArXiv.

[11]  Patrick Thiran,et al.  The Boolean Solution to the Congested IP Link Location Problem: Theory and Practice , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Albert G. Greenberg,et al.  Detection and Localization of Network Black Holes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Thomas F. La Porta,et al.  Service Placement for Detecting and Localizing Failures Using End-to-End Observations , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[14]  Ankit Singla,et al.  Jellyfish: Networking Data Centers Randomly , 2011, NSDI.

[15]  Kin K. Leung,et al.  Network Capability in Localizing Node Failures via End-to-End Path Measurements , 2015, IEEE/ACM Transactions on Networking.

[16]  Kin K. Leung,et al.  Node Failure Localization via Network Tomography , 2014, Internet Measurement Conference.

[17]  Kin K. Leung,et al.  On optimal monitor placement for localizing node failures via network tomography , 2015, Perform. Evaluation.