An Information-theoretic Approach to Network Measurement .ppt
《An Information-theoretic Approach to Network Measurement .ppt》由会员分享,可在线阅读,更多相关《An Information-theoretic Approach to Network Measurement .ppt(22页珍藏版)》请在麦多课文档分享上搜索。
1、1,An Information-theoretic Approach to Network Measurement and Monitoring,Yong Liu, Don Towsley, Tao Ye, Jean Bolot,2,Outline,motivationbackgroundflow-based network modelfull packet trace compression marginal/jointcoarser granularity netflow and SNMPfuture work,3,Motivation,network monitoring: sensi
2、ng a network traffic engineering, anomaly detection, single point v.s. distributeddifferent granularities full traffic trace: packet headers flow level record: timing, volume summary statistics: byte/packet countschallenges growing scales: high speed link, large topology constrained resources: proce
3、ssing, storage, transmission 30G headers/hour at UMass gatewaysolutions sampling: temporal/spatial compression: marginal/distributed,4,Questions,how much can we compress monitoring traces? how much information is captured by different monitoring granularity?packet trace/NetFlow/SNMP how much joint i
4、nformation is there in multiple monitors?joint compressiontrace aggregationmonitor placement,5,Our Contribution,flow-based network modelsexplore temporal/spatial correlation in network tracesprojection to different granularity information theoretic frameworkentropy: bound/guideline on trace compress
5、ionquantitative approach for more general problems validation against measurement from operational network,6,Entropy & Compression,Shannon entropy of discrete pression of i.i.d. symbols (length M) by coding coding: expected code length: info. theoretic bound on compression ratio: Shannon/Huffman cod
6、ing assign short codeword to frequent outcome achieve the H(X) bound,7,Entropy & Correlation,joint entropy entropy rate of stochastic processexploit temporal correlation Lempel-Ziv Coding: (LZ77, gzip, winzip) asymptotically achieve the bound for stationary processjoint entropy rate of correlated pr
7、ocessesexploit spatial correlation Slepian-Wolf Coding: (distributed compression) encode each process individually, achieve joint entropy rate in limit,8,Network Trace Compression,nave way: treat as byte stream, compress by generic toolsgzip compress UMass traces by a factor of 2network traces are h
8、ighly structured datamultiple fields per packet diversity in information richness correlation among fieldsmultiple packets per flowpackets within a flow share informationtemporal correlationmultiple monitors traversed by a flowmost fields unchanged within the networkspatial correlationnetwork models
9、 explore correlation structure quantify information content of network traces serves as lower bounds/guidelines for compression algorithms,9,Packet Header Trace,source IP address,destination IP address,data sequence number,acknowledgment number,time stamp (sec.),time stamp (sub-sec.),total length,To
10、S,vers.,HLen,IPID,flags,TTL,protocol,header checksum,destination port,source port,window size,Hlen,fragment offset,TCP flags,urgent pointer,checksum,Timing,IP Header,TCP Header,0,16,31,10,Header Field Entropy,source IP address,destination IP address,data sequence number,acknowledgment number,time st
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANINFORMATIONTHEORETICAPPROACHTONETWORKMEASUREMENTPPT

链接地址:http://www.mydoc123.com/p-378279.html