Difficulties in Simulating the Internet

advertisement
Difficulties in Simulating the Internet
Sally Floyd, Senior Member, IEEE, and Vern Paxson
IEEE/ACM Transactions on Networking, August 2001
Mingyu Sun
Instructor: Dr. Herman D. Hughes CSE808 Fall 2001
Today’s topics




Nov. 12, 2001
Role of simulations in Internet research
Difficulties in simulating the Internet
Strategies to accommodate
Develop a common network simulator
Mingyu Sun, CSE808 Presentation
2
Role of simulation

Measurement
– Is needed for crucial ‘reality check’
– Challenge implicit assumptions

Experiment
– For dealing with implementation issues
– For understanding behavior of intractable systems

Analysis
– Providing the possibility of exploring a model of the
Internet

Simulation
– Complementary to analysis
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
3
Measurement and experiment

What can do:
– explore “real world”
– the existing Internet
– new environment

What cannot do:
– explore future Internet
– explore different possible architectures
– “Success Disaster”
Example: HTTP protocol used by World Wide Web
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
4
Analysis and simulation

Analysis:
– Fundamental role
– Complete control the model of Internet
– Disadvantage: risk of losing Internet key behavior

Simulation:
–
–
–
–
Complementary to Analysis
Check correctness
Overcome the difficult, impossible cases in analysis
Develop research intuition
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
5
Simulation: dangers and pitfalls






Dynamic aspect of Internet
Picking the underlying models
Models used in Analysis and simulation
Capable, accurate simulators
Community requirement: immediate or long term
Validating simulation: make scripts public
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
6
Properties of Internet

Unify diverse networking technologies and
administrative domains.
– Uniform connectivity,not uniform behavior

Big Size
– 99.8 million computers at the end of 2000
– Range of heterogeneity is large
– Scaling problem: works fine with small number of
computers, but not on large scale

Changes: drastically
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
7
USENET Traffic Volume

Nov. 12, 2001
Bytes per day sent through
the USENET bulletin
board system, averaged
over two-week intervals.
The growth rate
corresponds to exponential
increase of 80% per year.
Mingyu Sun, CSE808 Presentation
8
LBNL Traffic Volume

Internet connections per
day at LBNL. The growth
rate corresponds to
exponential increase of
52% per year.
 LBNL- Lawrence
Berkeley National
Laboratory
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
9
Growth of LBNL’s WWW Traffic

Nov. 12, 2001
World Wide Web (HTTP)
connections per month at
LBNL.The growth rate
corresponds to doubling
every 7- 8 weeks.
Mingyu Sun, CSE808 Presentation
10
Heterogeneity -- Topology and link

Hard to characterize the protocol over a range of
topologies
– Constantly change, secret topological information
– Topology generator based on current Internet
– Large-scale nature of network topology and protocols

Modems Vs. fiber optic links
 Wire (Traverse copper, glass wire) Vs.Wireless (radio,
infrared-based)
 Point-to-point Vs. broadcast links (multi-access)
 Land-based Vs. satellite links( geosynchronous orbit, lowearth orbit)
 Dynamic routing (latency, bandwidth, load of paths)
 Routing asymmetric (large topology, scaling)
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
11
Heterogeneity -- Protocol


Conceptually, the Internet uses a unified set of protocols
In reality, each protocol has been implemented differently.
– Some studies are sensitive to the details of the protocol
– different user, different features, even bugs
– Example: TCP 400 implementation and versions.TCP Tahoe and
Reno replaced by NewReno and SACK

One must decide which applications to simulate using
those protocols
– Different applications have major different characteristics
– These characteristics can vary considerably from site to site
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
12
Heterogeneity -- Traffic

Basic question:
– How to introduce different traffic sources into the simulation,
while retaining the end-to-end congestion control

Trace-driven
– Problem: Rate adaptation from end-to-end congestion control
causes shaping
– Example: a connection observed on a high-speed unloaded link
might still send packages at a rate much lower than what the link
could sustain because somewhere else along the path insufficient
resources are available.
– Solution: Trace-driven source-level simulation preferable to tracedriven packet-level because data volume and the application-level
pattern are NOT shaped by the network’s current property
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
13
Problems with source-level trace-driven

NOT all sources can be reliably characterized by traffic
traces
– Example: remote login users terminate or justify commands
– Applications that are inherently adaptive (Internet Video) will be
shaped at both packet-level and application level.

Complexity of traffic congestion level to the network link
– From all degrees of congestion to none at all
– Predicting future evolution of congestion harder than
characterizing certain level of congestion at a particular time

Scaling issue arises using source models of individual
connections to generate aggregated cross-traffic for
simulation
– Expensive to simulate a traffic aggregate on a per source basis
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
14
Rapid and unpredictable change

Possibilities for unpredictable areas of change:
–
–
–
–
–
–
–
–

Pricing structures
Scheduling
Wireless
Impoverished devices
Native multicast
Differentiated service
Ubiquitous web-caching
a new “killer app”
Implications:
– Our research should not be heavily biased by network details that
are likely to change.
– Our research should not be invalidated by major architectural
changes that might or might not come to dominate the Internet
architecture several years down the road.
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
15
Coping strategies (I)
Search for invariants

What is invariant?
– Some facet of behavior that has been empirically shown to hold in a
very wide range of environments (traffic characteristics, call arrival
processes, session durations…)

Promising candidates:
– Diurnal patterns of activity
• Different patterns for different protocols, NNTP
• Different patterns for the same protocols, work/leisure surf
• Geographic effects on across time zone communication
–
–
–
–
–
–
Self- similarity
Poisson session arrivals
Log-normal connection sizes
Heavy-tailed distributions
Invariant distribution for Telnet packet
Invariant characteristics of the global topology
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
16
Coping strategies (II)
Exploring the parameter space
 Explore network behavior as a function of changing
parameters
– Parameters include protocol specifics, router queue management,
packet scheduling, network topologies and link properties, or
traffic mixes.
– Rule of thumb: Order of magnitude in parameter

Pitfall: Internet includes nonlinear feedback mechanisms
that may cause mistakes made by simulation artifacts not
present in the real world.
– Correct interpretation of simulation result
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
17
NS simulator

What is NS?
– NS is a multiprotocol simulator that implements unicast and multicast routing
algorithms, transport and session protocols (including both reliable and
unreliable multicast protocols), reservations and integrated services.
– NS incorporates a range of link-layer topologies and scheduling and queue
management algorithms.
– NS also incorporates libraries of network topology generators and traffic
generators, the network animator NAM, an emulation interface to allow the NS
simulator to interact with real-world traffic.

Advantage:
– Ability to build upon the work of others in sharing a common simulator

Disadvantages:
– affected by the same bugs or the same modeling assumptions that subtly skew
the results.
– No simulator eliminates the difficulties inherent in Internet simulation

Trends in network simulation: Parallel and distributed simulators
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
18
Final notes

Discussed issues & difficulties in modeling
Internet traffic, topology and protocols
 Acknowledged limitations & potential of
simulations and model-based research
 Interpreting simulation results and drawing
conclusions
 Besides intuition and good judgment, rely on other
tools (measurements, experiments and analysis)
Thank you!
Nov. 12, 2001
Mingyu Sun, CSE808 Presentation
19
Download