SlideShare une entreprise Scribd logo
1  sur  83
Télécharger pour lire hors ligne
Methodologies for
        Networking Research


2 October 2009
   CS5229, Semester 1, 2009/10
   1
Measurement"
     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”




2 October 2009
      CS5229, Semester 1, 2009/10
       2
“Reality Check”
     Are our assumptions reasonable? Is our
     mathematical model a good estimation of the
     real world? 



2 October 2009
    CS5229, Semester 1, 2009/10
    3
2 October 2009
   CS5229, Semester 1, 2009/10
   5
2 October 2009
   CS5229, Semester 1, 2009/10
   6
Experimentation"
                  
     e.g., V. Jacobson. “Congestion Control and
     Avoidance"




2 October 2009
       CS5229, Semester 1, 2009/10
   7
Deal with implementation
 issues
 Sometimes unforeseen complexities (e.g. own
 research experience in Unreliable TCP) 




2 October 2009
   CS5229, Semester 1, 2009/10
   8
Understand the
  Behavior of Systems
 Some systems are too complex to understand
 with “thought experiments” alone.




2 October 2009
   CS5229, Semester 1, 2009/10
   9
2 October 2009
   CS5229, Semester 1, 2009/10
   10
2 October 2009
   CS5229, Semester 1, 2009/10
   11
Analysis"
     D. Chiu and R. Jain, "Analysis of the increase and
     decrease algorithms for congestion avoidance in
     computer networks,”"

     J. Padhye, V. Firoiu, D. Towesley, and J. Kurose

                           
     "Modeling TCP Throughput: A Simple Model and its
     Empirical Validation,”


2 October 2009
       CS5229, Semester 1, 2009/10
        12
Explore with Complete
 Control
 We can understand the basic forces that affect
 the system. e.g. TCP throughput is inversely
 propotional to √p




2 October 2009
   CS5229, Semester 1, 2009/10
    13
Simplify complex
  systems
   But, if too simplified, important behavior could
   be missed (TCP throughput without timeout)




2 October 2009
    CS5229, Semester 1, 2009/10
      14
Simulation"
         K. Fall and S. Floyd, "Simulation-based
         comparison of Tahoe, Reno, and SACK TCP,""

         S. Floyd, V. Jacobson, "Random Early Detection
         Gateways for Congestion Avoidance,"




2 October 2009
        CS5229, Semester 1, 2009/10
       15
Check Correctness of
 Analysis
 If a simulation uses the same assumptions/model
 as the analysis, this simply verifies the
 correctness of the mathematical derivations.




2 October 2009
   CS5229, Semester 1, 2009/10
     16
Check Correctness of
 Analysis
 Simulation can relax some assumptions, use more
 complex models, etc. to test the limits of analysis.

 (Real measurement/experiments still needed to
 check the usefulness of analysis results)


2 October 2009
    CS5229, Semester 1, 2009/10
          17
Explore Complex
 Systems
 Some systems are too difficult/impossible to
 analyzed (e.g. Internet) 




2 October 2009
   CS5229, Semester 1, 2009/10
   18
Helps Develop Intuition"




2 October 2009
   CS5229, Semester 1, 2009/10
   19
Measurement"
    Experimentation" 
Real World
                                                 }
    Analysis"
    Simulation" 
             }
                  Abstract Model




2 October 2009
   CS5229, Semester 1, 2009/10
       20
“Difficulties in
Simulating the Internet” "
    Sally Floyd, Van Paxson"
                              
 ACM/IEEE TON, 9(4) August 2001
Why is Internet hard to
            simulate?


2 October 2009
   CS5229, Semester 1, 2009/10
   22
1.!
                  Internet is diverse

2 October 2009
        CS5229, Semester 1, 2009/10
   23
End-hosts: phones,
     desktops, servers, iPod, Wii



2 October 2009
   CS5229, Semester 1, 2009/10
   24
Links: Ethernet, WiFi,
     Satellite, Dial-up, 3G



2 October 2009
   CS5229, Semester 1, 2009/10
   25
Transport: TCP variants,
     UDP, DCCP



2 October 2009
   CS5229, Semester 1, 2009/10
   26
Applications: games,
     videos, web, ftp, bittorrent 



2 October 2009
   CS5229, Semester 1, 2009/10
   27
2.!
                  Internet is huge

2 October 2009
      CS5229, Semester 1, 2009/10
   28
570,937,778
                   Number of Hosts as of July 2008
      http://www.isc.org/index.pl?/ops/ds/host-count-history.php




2 October 2009
         CS5229, Semester 1, 2009/10
                29
681,064,561
                        Number of Hosts as of July 2009
                  https://www.isc.org/solutions/survey/history




2 October 2009
              CS5229, Semester 1, 2009/10
         30
3.!
           Internet is changing

2 October 2009
   CS5229, Semester 1, 2009/10
   31
http://www.isc.org/ds/
2 October 2009
    CS5229, Semester 1, 2009/10
   32
2 October 2009
        CS5229, Semester 1, 2009/10
   33
                  http://www.dtc.umn.edu/mints/
Why is Internet hard to
     simulate?"

     1. Heterogeneous "
     2. Huge "
     3. Changing
2 October 2009
   CS5229, Semester 1, 2009/10
   35
What Internet topology
     should you use in your
     simulation?
     How are end hosts connected? What are the
     properties of the links?




2 October 2009
     CS5229, Semester 1, 2009/10
   38
Topology changes constantly"
 Companies keep info secrets"
 Routes may change"
 Routes may be asymmetric

2 October 2009
   CS5229, Semester 1, 2009/10
   39
You will need to simulate over
     a wide range of connectivity
     and link properties



2 October 2009
   CS5229, Semester 1, 2009/10
   40
Which TCP version to
     use?


2 October 2009
   CS5229, Semester 1, 2009/10
   43
Using “fingerprinting”,
     831 different TCP
     implementations and
     versions are identified.

2 October 2009
   CS5229, Semester 1, 2009/10
   44
Which to use? "
     Which to ignore? 


2 October 2009
   CS5229, Semester 1, 2009/10
   45
What applications to run? "

     What type of traffic to generate?"

     Telnet? FTP? Web? BitTorrent?
     Skype? 

2 October 2009
   CS5229, Semester 1, 2009/10
   46
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   47
How congested should
  the network be? 



2 October 2009
   CS5229, Semester 1, 2009/10
   48
Example from Sally Floyd:
RED vs DropTail


2 October 2009
   CS5229, Semester 1, 2009/10
   49
2 October 2009
   CS5229, Semester 1, 2009/10
   50
2 October 2009
   CS5229, Semester 1, 2009/10
   51
Example from Sally Floyd:
TFRC for VoIP


2 October 2009
   CS5229, Semester 1, 2009/10
   52
2 October 2009
   CS5229, Semester 1, 2009/10
   53
2 October 2009
   CS5229, Semester 1, 2009/10
   54
We can focus our
     simulation on dominant
     technology/application
     today..

2 October 2009
   CS5229, Semester 1, 2009/10
   55
TCP: NewReno SACKS"
     OS: Windows Linux"
     Applications: Web, FTP

2 October 2009
   CS5229, Semester 1, 2009/10
   56
What about tomorrow?


2 October 2009
   CS5229, Semester 1, 2009/10
   57
WiMax? "
     Sensors? "
     Virtual World?"
     DCCP?

2 October 2009
   CS5229, Semester 1, 2009/10
   58
How to verify the
    simulation is correct?


2 October 2009
   CS5229, Semester 1, 2009/10
   60
Looking for
                   Invariants


2 October 2009
     CS5229, Semester 1, 2009/10
   62
1. Diurnal Patterns


2 October 2009
   CS5229, Semester 1, 2009/10
   63
2 October 2009
   CS5229, Semester 1, 2009/10
   64
hour #constrained

---- ------------

  00   139   2.5%    -----------------------------------------------------X

  01   144   2.6%    ------------------------------------------------------X

  02   146   2.6%    -------------------------------------------------------X

  03   140   2.5%    -----------------------------------------------------X

  04   119   2.1%    ---------------------------------------------X

  05    89   1.6%    ----------------------------------X

  06    69   1.2%    --------------------------X

  07    55   1.0%    ---------------------X

  08    45   0.8%    -----------------X

  09    40   0.7%    ---------------X

  10    40   0.7%    ---------------X

  11    42   0.8%    ----------------X

  12    51   0.9%    -------------------X

  13    57   1.0%    ---------------------X

  14    68   1.2%    --------------------------X

  15    75   1.3%    ----------------------------X

  16    77   1.4%    -----------------------------X

  17    92   1.6%    -----------------------------------X

  18    98   1.8%    -------------------------------------X

  19   105   1.9%    ----------------------------------------X

  20   108   1.9%    -----------------------------------------X

  21   113   2.0%    -------------------------------------------X

  22   124   2.2%    -----------------------------------------------X

  23   134   2.4%    ---------------------------------------------------X	



                      U Waterloo Data 24 Oct 2007
2 October 2009
               CS5229, Semester 1, 2009/10
                       65
2. Self-Similar Traffic


2 October 2009
   CS5229, Semester 1, 2009/10
   66
The traffic is bursty
    regardless of time scale


2 October 2009
   CS5229, Semester 1, 2009/10
   67
Wikipedia

2 October 2009
   CS5229, Semester 1, 2009/10
   68
3. Poisson Session
                   Arrival


2 October 2009
   CS5229, Semester 1, 2009/10
   69
Remote logins, starting
     FTP, beginning of web
          surfing etc.

2 October 2009
   CS5229, Semester 1, 2009/10
   70
(so are dead light bulbs,
     spelling mistakes, etc.)


2 October 2009
   CS5229, Semester 1, 2009/10
   71
4. Log-normal Duration


2 October 2009
   CS5229, Semester 1, 2009/10
   72
5. Heavy Tail
                  Distributions


2 October 2009
     CS5229, Semester 1, 2009/10
   73
Self-Similarity in World Wide Web Traffic: Evidence and Possible
      Causes, by Mark E. Crovella and Azer Bestavros
2 October 2009
          CS5229, Semester 1, 2009/10
               74
1. Looking for
                    Invariants


2 October 2009
      CS5229, Semester 1, 2009/10
   75
2. Explore Parameter
              Space


2 October 2009
   CS5229, Semester 1, 2009/10
   76
Change one parameter,"
                       fix the rest



2 October 2009
        CS5229, Semester 1, 2009/10
   77
Explore a wide range of values




2 October 2009
   CS5229, Semester 1, 2009/10
   78
3. Use Traces


2 October 2009
     CS5229, Semester 1, 2009/10
   79
e.g. collects traces of web
     sessions, video files, VoIP traffic



2 October 2009
   CS5229, Semester 1, 2009/10
   80
Use it to simulate the traffic
                      source



2 October 2009
    CS5229, Semester 1, 2009/10
   81
But must be careful about traffic
     shaping and user/application
              adaptation. 



2 October 2009
   CS5229, Semester 1, 2009/10
   82
e.g. traces collected during non-
congested time should not be use to
   simulate congested networks. 



2 October 2009
   CS5229, Semester 1, 2009/10
   83
4. publish simulator script for
                 others to verify



2 October 2009
   CS5229, Semester 1, 2009/10
   84
Conclusion


2 October 2009
    CS5229, Semester 1, 2009/10
   85
Simulation is useful but needs to
             do it properly



2 October 2009
   CS5229, Semester 1, 2009/10
   86
Be careful about your simulation
  model: you want it to be as simple
    as possible, but not simpler.



2 October 2009
   CS5229, Semester 1, 2009/10
   87
Be careful about your conclusion:
     “A is 13.5% better than B” is
           probably useless.



2 October 2009
   CS5229, Semester 1, 2009/10
   88
“A is 13.5% better than B under
             these environment”"
          is better but not general



2 October 2009
   CS5229, Semester 1, 2009/10
   89
Not really for quantitative results,
               but more for



2 October 2009
   CS5229, Semester 1, 2009/10
   90
understanding the dynamics,"
illustrate a point,"
explore unexpected behavior.



2 October 2009
   CS5229, Semester 1, 2009/10
   91

Contenu connexe

Similaire à CS5229 09/10 Lecture 6: Simulation

Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRCWei Tsang Ooi
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Wei Tsang Ooi
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetWei Tsang Ooi
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBenjamin Cabé
 
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
Cse 318  Project Report on Goethe Institut Bangladesh Network DesignCse 318  Project Report on Goethe Institut Bangladesh Network Design
Cse 318 Project Report on Goethe Institut Bangladesh Network DesignMaksudujjaman
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulationDeepak Shankar
 
Linking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code ArtifactsLinking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code ArtifactsAlberto Bacchelli
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2Drudndccn
 
Symfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo PragueSymfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo PraguePavel Campr
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Videoguy
 
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdfA Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdfNuioKila
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Benjamin Cabé
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbookBenjamin Cabé
 
Introduction to Building Communication Protocols
Introduction to Building Communication Protocols Introduction to Building Communication Protocols
Introduction to Building Communication Protocols Mahmoud Ahmed
 
My Name is E & Open Standards
My Name is E & Open StandardsMy Name is E & Open Standards
My Name is E & Open StandardsAndreas - Creten
 
Developer Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundationDeveloper Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundationThibault Cantegrel
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle yearsAlan Quayle
 

Similaire à CS5229 09/10 Lecture 6: Simulation (20)

Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
 
CS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the InternetCS5229 Lecture 9: Simulating the Internet
CS5229 Lecture 9: Simulating the Internet
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
Cse 318  Project Report on Goethe Institut Bangladesh Network DesignCse 318  Project Report on Goethe Institut Bangladesh Network Design
Cse 318 Project Report on Goethe Institut Bangladesh Network Design
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Linking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code ArtifactsLinking E-Mails and Source Code Artifacts
Linking E-Mails and Source Code Artifacts
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
Symfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo PragueSymfony - modern technology in practice, Webexpo Prague
Symfony - modern technology in practice, Webexpo Prague
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
 
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdfA Push-pull based Application Multicast Layer for P2P live video streaming.pdf
A Push-pull based Application Multicast Layer for P2P live video streaming.pdf
 
Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014Building the Internet of Things with Eclipse IoT - JavaLand 2014
Building the Internet of Things with Eclipse IoT - JavaLand 2014
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
 
Lecture 5: RED
Lecture 5: REDLecture 5: RED
Lecture 5: RED
 
Introduction to Building Communication Protocols
Introduction to Building Communication Protocols Introduction to Building Communication Protocols
Introduction to Building Communication Protocols
 
Nido
NidoNido
Nido
 
My Name is E & Open Standards
My Name is E & Open StandardsMy Name is E & Open Standards
My Name is E & Open Standards
 
Developer Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundationDeveloper Day 2014 - 6 - open source iot - eclipse foundation
Developer Day 2014 - 6 - open source iot - eclipse foundation
 
Networking research — A reflection in the middle years
Networking research — A reflection in the middle yearsNetworking research — A reflection in the middle years
Networking research — A reflection in the middle years
 

Plus de Wei Tsang Ooi

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingWei Tsang Ooi
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTubeWei Tsang Ooi
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesWei Tsang Ooi
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficWei Tsang Ooi
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureWei Tsang Ooi
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementWei Tsang Ooi
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationWei Tsang Ooi
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementWei Tsang Ooi
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterWei Tsang Ooi
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyWei Tsang Ooi
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionWei Tsang Ooi
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSWei Tsang Ooi
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingWei Tsang Ooi
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsWei Tsang Ooi
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceWei Tsang Ooi
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureWei Tsang Ooi
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsWei Tsang Ooi
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisWei Tsang Ooi
 
CS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet TopologyCS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet TopologyWei Tsang Ooi
 

Plus de Wei Tsang Ooi (20)

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
 
CS2106 Tutorial 2
CS2106 Tutorial 2CS2106 Tutorial 2
CS2106 Tutorial 2
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTube
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet Routing
 
CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
 
CS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic AnalysisCS4344 Lecture 9: Traffic Analysis
CS4344 Lecture 9: Traffic Analysis
 
CS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet TopologyCS5229 Lecture 9: Internet Topology
CS5229 Lecture 9: Internet Topology
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

CS5229 09/10 Lecture 6: Simulation

  • 1. Methodologies for Networking Research 2 October 2009 CS5229, Semester 1, 2009/10 1
  • 2. Measurement" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 2
  • 3. “Reality Check” Are our assumptions reasonable? Is our mathematical model a good estimation of the real world? 2 October 2009 CS5229, Semester 1, 2009/10 3
  • 4. 2 October 2009 CS5229, Semester 1, 2009/10 5
  • 5. 2 October 2009 CS5229, Semester 1, 2009/10 6
  • 6. Experimentation" e.g., V. Jacobson. “Congestion Control and Avoidance" 2 October 2009 CS5229, Semester 1, 2009/10 7
  • 7. Deal with implementation issues Sometimes unforeseen complexities (e.g. own research experience in Unreliable TCP) 2 October 2009 CS5229, Semester 1, 2009/10 8
  • 8. Understand the Behavior of Systems Some systems are too complex to understand with “thought experiments” alone. 2 October 2009 CS5229, Semester 1, 2009/10 9
  • 9. 2 October 2009 CS5229, Semester 1, 2009/10 10
  • 10. 2 October 2009 CS5229, Semester 1, 2009/10 11
  • 11. Analysis" D. Chiu and R. Jain, "Analysis of the increase and decrease algorithms for congestion avoidance in computer networks,”" J. Padhye, V. Firoiu, D. Towesley, and J. Kurose "Modeling TCP Throughput: A Simple Model and its Empirical Validation,” 2 October 2009 CS5229, Semester 1, 2009/10 12
  • 12. Explore with Complete Control We can understand the basic forces that affect the system. e.g. TCP throughput is inversely propotional to √p 2 October 2009 CS5229, Semester 1, 2009/10 13
  • 13. Simplify complex systems But, if too simplified, important behavior could be missed (TCP throughput without timeout) 2 October 2009 CS5229, Semester 1, 2009/10 14
  • 14. Simulation" K. Fall and S. Floyd, "Simulation-based comparison of Tahoe, Reno, and SACK TCP,"" S. Floyd, V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," 2 October 2009 CS5229, Semester 1, 2009/10 15
  • 15. Check Correctness of Analysis If a simulation uses the same assumptions/model as the analysis, this simply verifies the correctness of the mathematical derivations. 2 October 2009 CS5229, Semester 1, 2009/10 16
  • 16. Check Correctness of Analysis Simulation can relax some assumptions, use more complex models, etc. to test the limits of analysis. (Real measurement/experiments still needed to check the usefulness of analysis results) 2 October 2009 CS5229, Semester 1, 2009/10 17
  • 17. Explore Complex Systems Some systems are too difficult/impossible to analyzed (e.g. Internet) 2 October 2009 CS5229, Semester 1, 2009/10 18
  • 18. Helps Develop Intuition" 2 October 2009 CS5229, Semester 1, 2009/10 19
  • 19. Measurement" Experimentation" Real World } Analysis" Simulation" } Abstract Model 2 October 2009 CS5229, Semester 1, 2009/10 20
  • 20. “Difficulties in Simulating the Internet” " Sally Floyd, Van Paxson" ACM/IEEE TON, 9(4) August 2001
  • 21. Why is Internet hard to simulate? 2 October 2009 CS5229, Semester 1, 2009/10 22
  • 22. 1.! Internet is diverse 2 October 2009 CS5229, Semester 1, 2009/10 23
  • 23. End-hosts: phones, desktops, servers, iPod, Wii 2 October 2009 CS5229, Semester 1, 2009/10 24
  • 24. Links: Ethernet, WiFi, Satellite, Dial-up, 3G 2 October 2009 CS5229, Semester 1, 2009/10 25
  • 25. Transport: TCP variants, UDP, DCCP 2 October 2009 CS5229, Semester 1, 2009/10 26
  • 26. Applications: games, videos, web, ftp, bittorrent 2 October 2009 CS5229, Semester 1, 2009/10 27
  • 27. 2.! Internet is huge 2 October 2009 CS5229, Semester 1, 2009/10 28
  • 28. 570,937,778 Number of Hosts as of July 2008 http://www.isc.org/index.pl?/ops/ds/host-count-history.php 2 October 2009 CS5229, Semester 1, 2009/10 29
  • 29. 681,064,561 Number of Hosts as of July 2009 https://www.isc.org/solutions/survey/history 2 October 2009 CS5229, Semester 1, 2009/10 30
  • 30. 3.! Internet is changing 2 October 2009 CS5229, Semester 1, 2009/10 31
  • 31. http://www.isc.org/ds/ 2 October 2009 CS5229, Semester 1, 2009/10 32
  • 32. 2 October 2009 CS5229, Semester 1, 2009/10 33 http://www.dtc.umn.edu/mints/
  • 33. Why is Internet hard to simulate?" 1. Heterogeneous " 2. Huge " 3. Changing 2 October 2009 CS5229, Semester 1, 2009/10 35
  • 34. What Internet topology should you use in your simulation? How are end hosts connected? What are the properties of the links? 2 October 2009 CS5229, Semester 1, 2009/10 38
  • 35. Topology changes constantly" Companies keep info secrets" Routes may change" Routes may be asymmetric 2 October 2009 CS5229, Semester 1, 2009/10 39
  • 36. You will need to simulate over a wide range of connectivity and link properties 2 October 2009 CS5229, Semester 1, 2009/10 40
  • 37. Which TCP version to use? 2 October 2009 CS5229, Semester 1, 2009/10 43
  • 38. Using “fingerprinting”, 831 different TCP implementations and versions are identified. 2 October 2009 CS5229, Semester 1, 2009/10 44
  • 39. Which to use? " Which to ignore? 2 October 2009 CS5229, Semester 1, 2009/10 45
  • 40. What applications to run? " What type of traffic to generate?" Telnet? FTP? Web? BitTorrent? Skype? 2 October 2009 CS5229, Semester 1, 2009/10 46
  • 41. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 47
  • 42. How congested should the network be? 2 October 2009 CS5229, Semester 1, 2009/10 48
  • 43. Example from Sally Floyd: RED vs DropTail 2 October 2009 CS5229, Semester 1, 2009/10 49
  • 44. 2 October 2009 CS5229, Semester 1, 2009/10 50
  • 45. 2 October 2009 CS5229, Semester 1, 2009/10 51
  • 46. Example from Sally Floyd: TFRC for VoIP 2 October 2009 CS5229, Semester 1, 2009/10 52
  • 47. 2 October 2009 CS5229, Semester 1, 2009/10 53
  • 48. 2 October 2009 CS5229, Semester 1, 2009/10 54
  • 49. We can focus our simulation on dominant technology/application today.. 2 October 2009 CS5229, Semester 1, 2009/10 55
  • 50. TCP: NewReno SACKS" OS: Windows Linux" Applications: Web, FTP 2 October 2009 CS5229, Semester 1, 2009/10 56
  • 51. What about tomorrow? 2 October 2009 CS5229, Semester 1, 2009/10 57
  • 52. WiMax? " Sensors? " Virtual World?" DCCP? 2 October 2009 CS5229, Semester 1, 2009/10 58
  • 53. How to verify the simulation is correct? 2 October 2009 CS5229, Semester 1, 2009/10 60
  • 54. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 62
  • 55. 1. Diurnal Patterns 2 October 2009 CS5229, Semester 1, 2009/10 63
  • 56. 2 October 2009 CS5229, Semester 1, 2009/10 64
  • 57. hour #constrained
 ---- ------------
 00 139 2.5% -----------------------------------------------------X
 01 144 2.6% ------------------------------------------------------X
 02 146 2.6% -------------------------------------------------------X
 03 140 2.5% -----------------------------------------------------X
 04 119 2.1% ---------------------------------------------X
 05 89 1.6% ----------------------------------X
 06 69 1.2% --------------------------X
 07 55 1.0% ---------------------X
 08 45 0.8% -----------------X
 09 40 0.7% ---------------X
 10 40 0.7% ---------------X
 11 42 0.8% ----------------X
 12 51 0.9% -------------------X
 13 57 1.0% ---------------------X
 14 68 1.2% --------------------------X
 15 75 1.3% ----------------------------X
 16 77 1.4% -----------------------------X
 17 92 1.6% -----------------------------------X
 18 98 1.8% -------------------------------------X
 19 105 1.9% ----------------------------------------X
 20 108 1.9% -----------------------------------------X
 21 113 2.0% -------------------------------------------X
 22 124 2.2% -----------------------------------------------X
 23 134 2.4% ---------------------------------------------------X U Waterloo Data 24 Oct 2007 2 October 2009 CS5229, Semester 1, 2009/10 65
  • 58. 2. Self-Similar Traffic 2 October 2009 CS5229, Semester 1, 2009/10 66
  • 59. The traffic is bursty regardless of time scale 2 October 2009 CS5229, Semester 1, 2009/10 67
  • 60. Wikipedia 2 October 2009 CS5229, Semester 1, 2009/10 68
  • 61. 3. Poisson Session Arrival 2 October 2009 CS5229, Semester 1, 2009/10 69
  • 62. Remote logins, starting FTP, beginning of web surfing etc. 2 October 2009 CS5229, Semester 1, 2009/10 70
  • 63. (so are dead light bulbs, spelling mistakes, etc.) 2 October 2009 CS5229, Semester 1, 2009/10 71
  • 64. 4. Log-normal Duration 2 October 2009 CS5229, Semester 1, 2009/10 72
  • 65. 5. Heavy Tail Distributions 2 October 2009 CS5229, Semester 1, 2009/10 73
  • 66. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, by Mark E. Crovella and Azer Bestavros 2 October 2009 CS5229, Semester 1, 2009/10 74
  • 67. 1. Looking for Invariants 2 October 2009 CS5229, Semester 1, 2009/10 75
  • 68. 2. Explore Parameter Space 2 October 2009 CS5229, Semester 1, 2009/10 76
  • 69. Change one parameter," fix the rest 2 October 2009 CS5229, Semester 1, 2009/10 77
  • 70. Explore a wide range of values 2 October 2009 CS5229, Semester 1, 2009/10 78
  • 71. 3. Use Traces 2 October 2009 CS5229, Semester 1, 2009/10 79
  • 72. e.g. collects traces of web sessions, video files, VoIP traffic 2 October 2009 CS5229, Semester 1, 2009/10 80
  • 73. Use it to simulate the traffic source 2 October 2009 CS5229, Semester 1, 2009/10 81
  • 74. But must be careful about traffic shaping and user/application adaptation. 2 October 2009 CS5229, Semester 1, 2009/10 82
  • 75. e.g. traces collected during non- congested time should not be use to simulate congested networks. 2 October 2009 CS5229, Semester 1, 2009/10 83
  • 76. 4. publish simulator script for others to verify 2 October 2009 CS5229, Semester 1, 2009/10 84
  • 77. Conclusion 2 October 2009 CS5229, Semester 1, 2009/10 85
  • 78. Simulation is useful but needs to do it properly 2 October 2009 CS5229, Semester 1, 2009/10 86
  • 79. Be careful about your simulation model: you want it to be as simple as possible, but not simpler. 2 October 2009 CS5229, Semester 1, 2009/10 87
  • 80. Be careful about your conclusion: “A is 13.5% better than B” is probably useless. 2 October 2009 CS5229, Semester 1, 2009/10 88
  • 81. “A is 13.5% better than B under these environment”" is better but not general 2 October 2009 CS5229, Semester 1, 2009/10 89
  • 82. Not really for quantitative results, but more for 2 October 2009 CS5229, Semester 1, 2009/10 90
  • 83. understanding the dynamics," illustrate a point," explore unexpected behavior. 2 October 2009 CS5229, Semester 1, 2009/10 91