SlideShare a Scribd company logo
1 of 21
Download to read offline
T ffi M t i E ti tiT ffi M t i E ti tiTraffic Matrix EstimationsTraffic Matrix Estimations
directions and trendsdirections and trendsdirections and trendsdirections and trends
FRnOGFRnOG –– 1212thth MeetingMeeting
Paris, 5/30/2008Paris, 5/30/2008
Problem definition
• Network Engineers have been building very large scale networks at their
best trying to understand beforehand (planning) and react just in time to thebest, trying to understand beforehand (planning) and react just in time to the
network events
• Prerequisite to effectively (or even optimally) re-arrange the traffic across
the network, is understanding what is the relative size of each Origin-
Destination flow. This problem is called the Traffic Matrix determination or
ti tiestimation
• In the last few years several methods have been presented because directIn the last few years several methods have been presented because direct
measurement are way too computationally intensive thus unfeasible
Proprietary and confidential
A waste of time?A waste of time?
Why would we want to know the Traffic Matrix?
• Traffic Engineering
O ti l t ffi di t ib tiOptimal traffic distribution
Best routing path selection
Reasonable dimensioning
Provisioning
Survivability of the network
• Planning
• Anomaly DetectionAnomaly Detection
«The knowledge of a correct TM is highly valuable»
Proprietary and confidential
… no, not really!… no, not really!
Destinations
100 Mbps Paris Athens Zurich
0Paris 80 …
80 Mbps
Origins
… …0Athens
100Zurich … 0
• Each element of the TM reflects how much traffic is flowing from a source
node to a destination node.
• It may represent either an average value or an instant value or a peak
value
• The whole set of Origin-Destination flows is called Traffic Matrix (TM)
Proprietary and confidential
What’s a TM?What’s a TM?
Mathematical formulation of the problemMathematical formulation of the problem
Let us define:
the undirected graph composed of nodes and edges
the flux between nodes and (vector representation of the TM)
the capacity between nodes and
the matrix describing the routing
Proprietary and confidential
Now some math! ;)Now some math! ;)
Algebraically speaking, the problem can be simply stated as follow
Unknown flows
(TM)(TM)
SNMP link counts Routing Matrix
• Or in its compact form as
Proprietary and confidential
Just a little bit moreJust a little bit more!!
• The system is highly under determined (# columns >> # rows)• The system is highly under-determined (# columns >> # rows)
• It is ill-conditioned
• If the rank of is full, then the number of possible solutions is equal to
• the rank of is full iff all the arcs are used by the internal routing protocol
• The solutions provide precious indications on
boundary of admittable capacityboundary of admittable capacity
pathological nodes
network stability
Proprietary and confidential
Some considerationSome consideration
The simple graph shown below has 4 nodes, 5 bidirectional edges, and
unitary metric values.y
fAB fAC fAD fBA fBC fBD fCA fCB fCD fDA fDB fDC
A→B 1 0 0.5 0 0 0 0 0 0 0 0 0
A←B 0 0 0 1 0 0 0 0 0 0 5 0 0
A
B
D
1 1
1
A←B 0 0 0 1 0 0 0 0 0 0.5 0 0
A→C 0 1 0.5 0 0 0 0 0 0 0 0 0
A←C 0 0 0 0 0 0 1 0 0 0.5 0 0
B→C 0 0 0 0 1 0 0 0 0 0 0 0
B←C 0 0 0 0 0 0 0 1 0 0 0 0
C
1 1
B←C 0 0 0 0 0 0 0 1 0 0 0 0
B→D 0 0 0.5 0 0 1 0 0 0 0 0 0
B←D 0 0 0 0 0 0 0 0 0 0.5 1 0
C→D 0 0 0.5 0 0 0 0 0 1 0 0 0
12 l (O D fl )
C←D 0 0 0 0 0 0 0 0 0 0.5 0 1
• 12 columns (O-D flows)
• 10 rows (links)
• The linear system has solutions!y
In this example we consider equal cost multiple paths (ECMP)
Proprietary and confidential
An example (1/3)An example (1/3)
p q p p ( )
• We can face the problem using several methods finding, in turn, one among
the infinite solutions
• The problem was tested with the following solvers:
General backslash operator (linear systems solver)
Linear Programming Solver (Interior Point)
Non Negative Least-Square Method
Conjugate-Gradient Method
Linear Least-Square Method with constraintsq
Proprietary and confidential
An example (2/3)An example (2/3)
The vector representation of the synthetic OD-Matrix is:
th t bj t d t th R ti M t i d t i th it tthat, subjected to the Routing Matrix , determines the arc capacity vector:
Using the five aforementioned methods the obtained results are:
Proprietary and confidential
An example (3/3)An example (3/3)
Adding links may not be your best friend approach:
Nodes: 8
A 36
CB F
Arcs: 36
Flows: 8x7=56
A D G
• The analysis of this network helped us to understand the relation between
E H
• The analysis of this network helped us to understand the relation between
adding arcs to the network and the stability of the flow solutions found
I h l d i l k ffi i i i i• It seems that on a planar and simple network, traffic optimization is easy to
perform. When the number of arcs increases, the problem of optimization
becomes more difficult and the maximal capacity decreases, to increase
i h th t k i t f d i t it liagain when the network is transformed into its clique
Proprietary and confidential
Solutions?Solutions?
Principal Component Analysis (PCA)
• The PCA reduces the dimensionality of the problem identifying the
components having maximum energy (or variability)p g gy ( y)
• It has been demonstrated that a set of OD flows measured over large time
scale can be represented by the sum of a small number of eigenflows (<10)scale can be represented by the sum of a small number of eigenflows (<10)
• The problem of eigenflows evaluation is well-posed then a solution exists
and is unique!and is unique!
Problem: the set of flow measurements is needed!
• PCA techniques are used in large number of applications such as
databases, regression analysis, cluster analysis, intrusion analysis, and, g y , y , y ,
many others
Proprietary and confidential
Component Analysis (1/2)Component Analysis (1/2)
Independent Component Analysis (ICA)
• ICA can be seen as an extension of the PCA and identifies the independent
components that are non-gaussian and mutually independent.p g y p
• The method is widely used in Audio Signal Processing, medical diagnosis
(e g MEG*) and digital image correction(e.g. MEG ), and digital image correction
C C (CC )Curvilinear Component Analysis (CCA)
• The CCA/CDA (Curvilinear Distance Analysis) is an extension of the PCA( y )
for non-linear domains
* Magnetoencephalography
Proprietary and confidential
Component Analysis (2/2)Component Analysis (2/2)
g p g p y
Is our graph a good graph?
• How simple or possible would be to remap the OD-Flows on the network.
• The eigenvalues and the eigenvectors of the Adjacency (or the Laplacian)
matrix show interesting properties
In example it is possible to easily evaluate:
the isomorphism of different graphs
how “well connected” the graph is (that is represented by the magnitude of
the second smallest eigenvalue)the second smallest eigenvalue)
Proprietary and confidential
Spectral Graph TheorySpectral Graph Theory
• Methods available in literature need direct flows measurement in order to
i t i t t d t ti d fi itiassist in strategy and tactics definition
• The best approach would be augmenting the LP Model with real traffic data,
but we understand that flows sampling is a difficult and burdensome taskbut we understand that flows sampling is a difficult and burdensome task
To sum up:
pure analytic methods are advantageous but subject to errors that cannot be
computed
Hybrid methods (with direct methods for flows determination) are better but
not enough
N t h i d h t d l k i iNew techniques and research trends look promising
«We are in any case providing estimated TM data to total-survivability modelsy p g y
to evaluate robustness of the arc-failing predictions and protections»
Proprietary and confidential
ConclusionsConclusions
Any Question? (now…)
(…or later)
Davide Cherubini
R&D Labs
Tiscali International Network
research@tiscali.net
Proprietary and confidential
ThanksThanks
Backup slides
Proprietary and confidential
1st Generation Methods
• Introduce additional constraints with simple models for OD pairs (e.g.
Poisson, Gaussian distribution)
• Highly dependent upon an initial prior estimate of the TMHighly dependent upon an initial prior estimate of the TM
• Neither spatial nor temporal correlation
2 d G ti M th d2nd Generation Methods
• Extra SNMP measurement data (e.g. from access and peer links). Gravity( g p ) y
models (Tomogravity)
• Explicitly change the routing, by changing the link metrics. This method
increases the rank of the Routing Matrix by adding new rowsg y g
• Dynamic model intended to capture the temporal evolution of OD flows by
mean of a Fourier expansion plus a noise model. It further increase the rank
of the Routing Matrixof the Routing Matrix
Proprietary and confidential
Looking back… (1/2)Looking back… (1/2)
3rd Generation Methods
• Fanout
• Defined as “the vector capturing the fraction of incoming traffic that
each node forwards to each egress node inside the network” [Crovella eteach node forwards to each egress node inside the network [Crovella, et.
al. SIGMETRICS ‘05]
• Purely based on traffic measurements. Neither Routing Matrix nor
inference is used
• Principal Component Analysis (PCA)
• Kalman Filtering• Kalman Filtering
• Directly derived from Dynamic System Linear Theory
• Spatio-temporal correlations within a single equation
• The Kalman filter is the best linear minimum variance estimator in the
case of zero mean Gaussian noise
In order to correctly calibrate 3G models, at least 24 hours of traffic
measurement is needed!!
Proprietary and confidential
Looking back… (2/2)Looking back… (2/2)
• If we deal with simple examples, in which the number of nodes and arcs is
relatively small, we can definitely employ a direct strategy to find the optimaly , y p y gy p
traffic flows layout.
• When the problem becomes large it in necessary to find appropriateWhen the problem becomes large, it in necessary to find appropriate
numerical strategies to overcome either in space or time complexity.
• V i t h i b l d b t f d th t i i it• Various techniques can be employed, but we found that in various cases, it
is a good starting point understanding how well behaving is your network
graph and IGP weights by factoring the arc-flows matrix via the Singular
Value Decomposition (SVD)Value Decomposition (SVD).
• The SVD provides a lot of useful information on the problem. In example it
id hi h ibl h bl i h dprovides an hint on how sensible the problem is on error on the data
(conditioning), and it is a starting point towards finding the Moore-Penrose
pseudo-inverse.
• This matrix provides a solution to the problem in the least-square sense.
Proprietary and confidential
Large Problems TacticsLarge Problems Tactics
• From SVD theory we know that any real matrix can be factorized in the
product of two unitary matrices and and a diagonal matrix
• This decomposition is important as the Moore-Penrose Pseudoinverse can
be calculated as followbe calculated as follow
• Where is the matrix constructed replacing all non-zero elements with
their reciprocal (its “inverse”)
• The pseudoinverse has some nice properties of the inverse. In fact it can be
multiplied to the Capacities Vector provides the solution of the linear system
that minimizes the Euclidean normthat minimizes the Euclidean norm
Proprietary and confidential
From SVD to PinvFrom SVD to Pinv

More Related Content

What's hot (20)

Flex ch
Flex chFlex ch
Flex ch
 
Fakhre alam
Fakhre alamFakhre alam
Fakhre alam
 
Queueing theory
Queueing theoryQueueing theory
Queueing theory
 
basics of stochastic and queueing theory
basics of stochastic and queueing theorybasics of stochastic and queueing theory
basics of stochastic and queueing theory
 
Open and closed queueing network
Open and closed queueing networkOpen and closed queueing network
Open and closed queueing network
 
Chap5 slides
Chap5 slidesChap5 slides
Chap5 slides
 
Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...
 
Introduction to transport resilience
Introduction to transport resilienceIntroduction to transport resilience
Introduction to transport resilience
 
TRR Paper
TRR PaperTRR Paper
TRR Paper
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
 
PPoPP15
PPoPP15PPoPP15
PPoPP15
 
Differential game theory for Traffic Flow Modelling
Differential game theory for Traffic Flow ModellingDifferential game theory for Traffic Flow Modelling
Differential game theory for Traffic Flow Modelling
 
Internet
InternetInternet
Internet
 
Route choice
Route choiceRoute choice
Route choice
 
Chap3 slides
Chap3 slidesChap3 slides
Chap3 slides
 
Lecture set 6
Lecture set 6Lecture set 6
Lecture set 6
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Design and analysis of Algorithm By Dr. B. J. Mohite
Design and analysis of Algorithm By Dr. B. J. MohiteDesign and analysis of Algorithm By Dr. B. J. Mohite
Design and analysis of Algorithm By Dr. B. J. Mohite
 
pdf
pdfpdf
pdf
 
G027048051
G027048051G027048051
G027048051
 

Viewers also liked

Traffic State Estimation and Prediction under Heterogeneous Traffic Conditions
Traffic State Estimation and Prediction under Heterogeneous Traffic ConditionsTraffic State Estimation and Prediction under Heterogeneous Traffic Conditions
Traffic State Estimation and Prediction under Heterogeneous Traffic ConditionsIDES Editor
 
Matrices and row operations 12123 and applications of matrices
Matrices and row operations 12123 and applications of matricesMatrices and row operations 12123 and applications of matrices
Matrices and row operations 12123 and applications of matricesmayaGER
 
Traffic Flow Fundamentals
Traffic Flow FundamentalsTraffic Flow Fundamentals
Traffic Flow FundamentalsShaira Lucero
 
Linear Equations
Linear EquationsLinear Equations
Linear Equationsrfant
 
Dr. radheyshyam (principles and techniques of ao)
Dr. radheyshyam (principles and techniques of ao)Dr. radheyshyam (principles and techniques of ao)
Dr. radheyshyam (principles and techniques of ao)rsd8106
 

Viewers also liked (8)

Traffic State Estimation and Prediction under Heterogeneous Traffic Conditions
Traffic State Estimation and Prediction under Heterogeneous Traffic ConditionsTraffic State Estimation and Prediction under Heterogeneous Traffic Conditions
Traffic State Estimation and Prediction under Heterogeneous Traffic Conditions
 
Matrices and row operations 12123 and applications of matrices
Matrices and row operations 12123 and applications of matricesMatrices and row operations 12123 and applications of matrices
Matrices and row operations 12123 and applications of matrices
 
mix traffic
mix trafficmix traffic
mix traffic
 
Flow control 11
Flow control 11Flow control 11
Flow control 11
 
Control system
Control systemControl system
Control system
 
Traffic Flow Fundamentals
Traffic Flow FundamentalsTraffic Flow Fundamentals
Traffic Flow Fundamentals
 
Linear Equations
Linear EquationsLinear Equations
Linear Equations
 
Dr. radheyshyam (principles and techniques of ao)
Dr. radheyshyam (principles and techniques of ao)Dr. radheyshyam (principles and techniques of ao)
Dr. radheyshyam (principles and techniques of ao)
 

Similar to TINET_FRnOG_2008_public

Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Muhammad Hammad Waseem
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthIdcIdk1
 
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...MohammedAlasmar3
 
Data Stream Management
Data Stream ManagementData Stream Management
Data Stream Managementk_tauhid
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)Vincenzo Gulisano
 
Network-Wide Heavy-Hitter Detection with Commodity Switches
Network-Wide Heavy-Hitter Detection with Commodity SwitchesNetwork-Wide Heavy-Hitter Detection with Commodity Switches
Network-Wide Heavy-Hitter Detection with Commodity SwitchesAJAY KHARAT
 
Analytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsAnalytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsMary Calkins
 
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...Junho Suh
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Praktijkrelevantie TRAIL PhD onderzoek
Praktijkrelevantie TRAIL PhD onderzoekPraktijkrelevantie TRAIL PhD onderzoek
Praktijkrelevantie TRAIL PhD onderzoekSerge Hoogendoorn
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraJason Riedy
 
Big learning 1.2
Big learning   1.2Big learning   1.2
Big learning 1.2Mohit Garg
 
Week-3 – System RSupplemental material1Recap •.docx
Week-3 – System RSupplemental material1Recap •.docxWeek-3 – System RSupplemental material1Recap •.docx
Week-3 – System RSupplemental material1Recap •.docxhelzerpatrina
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
 
SPLT Transformer.pptx
SPLT Transformer.pptxSPLT Transformer.pptx
SPLT Transformer.pptxSeungeon Baek
 

Similar to TINET_FRnOG_2008_public (20)

Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
 
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...
INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its ...
 
Data Stream Management
Data Stream ManagementData Stream Management
Data Stream Management
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)Crash course on data streaming (with examples using Apache Flink)
Crash course on data streaming (with examples using Apache Flink)
 
Real time traffic management - challenges and solutions
Real time traffic management - challenges and solutionsReal time traffic management - challenges and solutions
Real time traffic management - challenges and solutions
 
Network-Wide Heavy-Hitter Detection with Commodity Switches
Network-Wide Heavy-Hitter Detection with Commodity SwitchesNetwork-Wide Heavy-Hitter Detection with Commodity Switches
Network-Wide Heavy-Hitter Detection with Commodity Switches
 
Analytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsAnalytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment Models
 
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...
Opensample: A Low-latency, Sampling-based Measurement Platform for Software D...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Praktijkrelevantie TRAIL PhD onderzoek
Praktijkrelevantie TRAIL PhD onderzoekPraktijkrelevantie TRAIL PhD onderzoek
Praktijkrelevantie TRAIL PhD onderzoek
 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
Big learning 1.2
Big learning   1.2Big learning   1.2
Big learning 1.2
 
Week-3 – System RSupplemental material1Recap •.docx
Week-3 – System RSupplemental material1Recap •.docxWeek-3 – System RSupplemental material1Recap •.docx
Week-3 – System RSupplemental material1Recap •.docx
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
Chapter5.pdf
Chapter5.pdfChapter5.pdf
Chapter5.pdf
 
SPLT Transformer.pptx
SPLT Transformer.pptxSPLT Transformer.pptx
SPLT Transformer.pptx
 
Queuing Theory
Queuing TheoryQueuing Theory
Queuing Theory
 

TINET_FRnOG_2008_public

  • 1. T ffi M t i E ti tiT ffi M t i E ti tiTraffic Matrix EstimationsTraffic Matrix Estimations directions and trendsdirections and trendsdirections and trendsdirections and trends FRnOGFRnOG –– 1212thth MeetingMeeting Paris, 5/30/2008Paris, 5/30/2008
  • 2. Problem definition • Network Engineers have been building very large scale networks at their best trying to understand beforehand (planning) and react just in time to thebest, trying to understand beforehand (planning) and react just in time to the network events • Prerequisite to effectively (or even optimally) re-arrange the traffic across the network, is understanding what is the relative size of each Origin- Destination flow. This problem is called the Traffic Matrix determination or ti tiestimation • In the last few years several methods have been presented because directIn the last few years several methods have been presented because direct measurement are way too computationally intensive thus unfeasible Proprietary and confidential A waste of time?A waste of time?
  • 3. Why would we want to know the Traffic Matrix? • Traffic Engineering O ti l t ffi di t ib tiOptimal traffic distribution Best routing path selection Reasonable dimensioning Provisioning Survivability of the network • Planning • Anomaly DetectionAnomaly Detection «The knowledge of a correct TM is highly valuable» Proprietary and confidential … no, not really!… no, not really!
  • 4. Destinations 100 Mbps Paris Athens Zurich 0Paris 80 … 80 Mbps Origins … …0Athens 100Zurich … 0 • Each element of the TM reflects how much traffic is flowing from a source node to a destination node. • It may represent either an average value or an instant value or a peak value • The whole set of Origin-Destination flows is called Traffic Matrix (TM) Proprietary and confidential What’s a TM?What’s a TM?
  • 5. Mathematical formulation of the problemMathematical formulation of the problem Let us define: the undirected graph composed of nodes and edges the flux between nodes and (vector representation of the TM) the capacity between nodes and the matrix describing the routing Proprietary and confidential Now some math! ;)Now some math! ;)
  • 6. Algebraically speaking, the problem can be simply stated as follow Unknown flows (TM)(TM) SNMP link counts Routing Matrix • Or in its compact form as Proprietary and confidential Just a little bit moreJust a little bit more!!
  • 7. • The system is highly under determined (# columns >> # rows)• The system is highly under-determined (# columns >> # rows) • It is ill-conditioned • If the rank of is full, then the number of possible solutions is equal to • the rank of is full iff all the arcs are used by the internal routing protocol • The solutions provide precious indications on boundary of admittable capacityboundary of admittable capacity pathological nodes network stability Proprietary and confidential Some considerationSome consideration
  • 8. The simple graph shown below has 4 nodes, 5 bidirectional edges, and unitary metric values.y fAB fAC fAD fBA fBC fBD fCA fCB fCD fDA fDB fDC A→B 1 0 0.5 0 0 0 0 0 0 0 0 0 A←B 0 0 0 1 0 0 0 0 0 0 5 0 0 A B D 1 1 1 A←B 0 0 0 1 0 0 0 0 0 0.5 0 0 A→C 0 1 0.5 0 0 0 0 0 0 0 0 0 A←C 0 0 0 0 0 0 1 0 0 0.5 0 0 B→C 0 0 0 0 1 0 0 0 0 0 0 0 B←C 0 0 0 0 0 0 0 1 0 0 0 0 C 1 1 B←C 0 0 0 0 0 0 0 1 0 0 0 0 B→D 0 0 0.5 0 0 1 0 0 0 0 0 0 B←D 0 0 0 0 0 0 0 0 0 0.5 1 0 C→D 0 0 0.5 0 0 0 0 0 1 0 0 0 12 l (O D fl ) C←D 0 0 0 0 0 0 0 0 0 0.5 0 1 • 12 columns (O-D flows) • 10 rows (links) • The linear system has solutions!y In this example we consider equal cost multiple paths (ECMP) Proprietary and confidential An example (1/3)An example (1/3) p q p p ( )
  • 9. • We can face the problem using several methods finding, in turn, one among the infinite solutions • The problem was tested with the following solvers: General backslash operator (linear systems solver) Linear Programming Solver (Interior Point) Non Negative Least-Square Method Conjugate-Gradient Method Linear Least-Square Method with constraintsq Proprietary and confidential An example (2/3)An example (2/3)
  • 10. The vector representation of the synthetic OD-Matrix is: th t bj t d t th R ti M t i d t i th it tthat, subjected to the Routing Matrix , determines the arc capacity vector: Using the five aforementioned methods the obtained results are: Proprietary and confidential An example (3/3)An example (3/3)
  • 11. Adding links may not be your best friend approach: Nodes: 8 A 36 CB F Arcs: 36 Flows: 8x7=56 A D G • The analysis of this network helped us to understand the relation between E H • The analysis of this network helped us to understand the relation between adding arcs to the network and the stability of the flow solutions found I h l d i l k ffi i i i i• It seems that on a planar and simple network, traffic optimization is easy to perform. When the number of arcs increases, the problem of optimization becomes more difficult and the maximal capacity decreases, to increase i h th t k i t f d i t it liagain when the network is transformed into its clique Proprietary and confidential Solutions?Solutions?
  • 12. Principal Component Analysis (PCA) • The PCA reduces the dimensionality of the problem identifying the components having maximum energy (or variability)p g gy ( y) • It has been demonstrated that a set of OD flows measured over large time scale can be represented by the sum of a small number of eigenflows (<10)scale can be represented by the sum of a small number of eigenflows (<10) • The problem of eigenflows evaluation is well-posed then a solution exists and is unique!and is unique! Problem: the set of flow measurements is needed! • PCA techniques are used in large number of applications such as databases, regression analysis, cluster analysis, intrusion analysis, and, g y , y , y , many others Proprietary and confidential Component Analysis (1/2)Component Analysis (1/2)
  • 13. Independent Component Analysis (ICA) • ICA can be seen as an extension of the PCA and identifies the independent components that are non-gaussian and mutually independent.p g y p • The method is widely used in Audio Signal Processing, medical diagnosis (e g MEG*) and digital image correction(e.g. MEG ), and digital image correction C C (CC )Curvilinear Component Analysis (CCA) • The CCA/CDA (Curvilinear Distance Analysis) is an extension of the PCA( y ) for non-linear domains * Magnetoencephalography Proprietary and confidential Component Analysis (2/2)Component Analysis (2/2) g p g p y
  • 14. Is our graph a good graph? • How simple or possible would be to remap the OD-Flows on the network. • The eigenvalues and the eigenvectors of the Adjacency (or the Laplacian) matrix show interesting properties In example it is possible to easily evaluate: the isomorphism of different graphs how “well connected” the graph is (that is represented by the magnitude of the second smallest eigenvalue)the second smallest eigenvalue) Proprietary and confidential Spectral Graph TheorySpectral Graph Theory
  • 15. • Methods available in literature need direct flows measurement in order to i t i t t d t ti d fi itiassist in strategy and tactics definition • The best approach would be augmenting the LP Model with real traffic data, but we understand that flows sampling is a difficult and burdensome taskbut we understand that flows sampling is a difficult and burdensome task To sum up: pure analytic methods are advantageous but subject to errors that cannot be computed Hybrid methods (with direct methods for flows determination) are better but not enough N t h i d h t d l k i iNew techniques and research trends look promising «We are in any case providing estimated TM data to total-survivability modelsy p g y to evaluate robustness of the arc-failing predictions and protections» Proprietary and confidential ConclusionsConclusions
  • 16. Any Question? (now…) (…or later) Davide Cherubini R&D Labs Tiscali International Network research@tiscali.net Proprietary and confidential ThanksThanks
  • 18. 1st Generation Methods • Introduce additional constraints with simple models for OD pairs (e.g. Poisson, Gaussian distribution) • Highly dependent upon an initial prior estimate of the TMHighly dependent upon an initial prior estimate of the TM • Neither spatial nor temporal correlation 2 d G ti M th d2nd Generation Methods • Extra SNMP measurement data (e.g. from access and peer links). Gravity( g p ) y models (Tomogravity) • Explicitly change the routing, by changing the link metrics. This method increases the rank of the Routing Matrix by adding new rowsg y g • Dynamic model intended to capture the temporal evolution of OD flows by mean of a Fourier expansion plus a noise model. It further increase the rank of the Routing Matrixof the Routing Matrix Proprietary and confidential Looking back… (1/2)Looking back… (1/2)
  • 19. 3rd Generation Methods • Fanout • Defined as “the vector capturing the fraction of incoming traffic that each node forwards to each egress node inside the network” [Crovella eteach node forwards to each egress node inside the network [Crovella, et. al. SIGMETRICS ‘05] • Purely based on traffic measurements. Neither Routing Matrix nor inference is used • Principal Component Analysis (PCA) • Kalman Filtering• Kalman Filtering • Directly derived from Dynamic System Linear Theory • Spatio-temporal correlations within a single equation • The Kalman filter is the best linear minimum variance estimator in the case of zero mean Gaussian noise In order to correctly calibrate 3G models, at least 24 hours of traffic measurement is needed!! Proprietary and confidential Looking back… (2/2)Looking back… (2/2)
  • 20. • If we deal with simple examples, in which the number of nodes and arcs is relatively small, we can definitely employ a direct strategy to find the optimaly , y p y gy p traffic flows layout. • When the problem becomes large it in necessary to find appropriateWhen the problem becomes large, it in necessary to find appropriate numerical strategies to overcome either in space or time complexity. • V i t h i b l d b t f d th t i i it• Various techniques can be employed, but we found that in various cases, it is a good starting point understanding how well behaving is your network graph and IGP weights by factoring the arc-flows matrix via the Singular Value Decomposition (SVD)Value Decomposition (SVD). • The SVD provides a lot of useful information on the problem. In example it id hi h ibl h bl i h dprovides an hint on how sensible the problem is on error on the data (conditioning), and it is a starting point towards finding the Moore-Penrose pseudo-inverse. • This matrix provides a solution to the problem in the least-square sense. Proprietary and confidential Large Problems TacticsLarge Problems Tactics
  • 21. • From SVD theory we know that any real matrix can be factorized in the product of two unitary matrices and and a diagonal matrix • This decomposition is important as the Moore-Penrose Pseudoinverse can be calculated as followbe calculated as follow • Where is the matrix constructed replacing all non-zero elements with their reciprocal (its “inverse”) • The pseudoinverse has some nice properties of the inverse. In fact it can be multiplied to the Capacities Vector provides the solution of the linear system that minimizes the Euclidean normthat minimizes the Euclidean norm Proprietary and confidential From SVD to PinvFrom SVD to Pinv