Algorithms and Estimators for Summarization of Unaggregated Data Streams

Information

  • Patent Application
  • 20090303901
  • Publication Number
    20090303901
  • Date Filed
    June 10, 2008
    16 years ago
  • Date Published
    December 10, 2009
    14 years ago
Abstract
The invention relates to streaming algorithms useful for obtaining summaries over unaggregated packet streams and for providing unbiased estimators for characteristics, such as, the amount of traffic that belongs to a specified subpopulation of flows. Packets are sampled from a packet stream and aggregated into flows and counted by implementation of Adaptive Sample-and-Hold (ASH) or Adaptive NetFlow (ANF), adjusting the sampling rate based on a quantity of flows to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps; and transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate.
Description
FIELD OF THE INVENTION

The present invention generally relates to streaming algorithms useful for obtaining summaries efficiently over unaggregated packet streams and for providing unbiased estimators for various characteristics, such as, for example, the amount of traffic that belongs to a specified subpopulation of flows, which are more accurate than prior art algorithms.


BACKGROUND OF THE INVENTION

Collection and summarization of network traffic data is necessary for many applications including billing, provisioning, anomaly detection, inferring traffic demands, and conjuring packet filters and routing protocols. Traffic includes interleaving packets of multiple flows but the summaries should support queries on statistics of subpopulations of IP flows, such as the amount of traffic that belongs to a particular protocol, originate from a particular AS, or both. These queries are posed after the sketch is produced. Therefore, it is critical to retain sufficient metadata information and provide estimators that facilitate such queries.


IP packet streams are processed in real-time at the routers by systems, such as Cisco's sampled NetFlow (NF) or processed by software tools, such as Gigascope [8]. Two critical resources in the collection of data are the high-speed memory (usually expensive fast SRAM) and CPU power that are used to process the incoming packets. The available memory limits the number of cached flows that can be actively counted. The processing power limits the level of per-packet processing and the fraction of packets that can undergo higher-level processing.


The practice is to obtain periodic summaries (sketches) of traffic by applying a data stream algorithm to the raw packet stream. NF samples packets randomly at a fixed rate. Once a flow is sampled, it is cached, and a counter is created that counts subsequent sampled packets of the same flow. The number of counters is the number of distinct sampled flows. The packet-level sampling that NF performs serves two purposes. First, it addresses the memory constraint by reducing the number of distinct flows that are cached (the bulk of small flows is not sampled). Without sampling, a counter is needed for each distinct flow in the original stream. Second, the sampling reduces the processing power needed for the aggregation, since only sampled packets require the higher-level processing required to determine if they belong to a cached flow.


An algorithm that is able to count more packets than NF using the same number of statistics counters (memory) is sample-and-hold (SH) [13, 12]. With SH, as with NF, packets are sampled at a fixed rate and once a packet from a particular flow is sampled, the flow is cached. The difference is that with SH, once a flow is actively counted, all subsequent packets that belong to the same flow are counted (with NF, only sampled packets are counted). SH sketches are considerably more accurate than NF sketches [13, 12]. A disadvantage of SH over NF, however, is that the summarization module must process every packet in order to determine if it belongs to a cached flow. This additional processing makes it less practical for high volume routers.


NF and SH use a fixed packet sampling rate, as a result, the number of distinct flows that are sampled and therefore the number of statistics counters required is variable. When conditions are stable, the number of distinct flows sampled using a given sampling rate has small variance. Therefore one can manually adjust the sampling rate so that the number of counters does not exceed the memory limit and most counters are utilized [12]. Anomalies such as DDoS attacks, however, can greatly affect the number of distinct flows. A fixed-sampling-rate scheme can not react to such anomalies as its memory requirement would exceed the available memory. Therefore, anomalies would cause disruption of measurement or affect router performance. These issues are addressed by adaptive variants that include adaptive sampled NetFlow (ANF) [13, 11, 16] and adaptive SH (ASH) [13, 12]. These variants adaptively decrease the sampling rate and adjust the values of the statistics counters as to emulate sampling with a lower rate.


SUMMARY OF THE INVENTION

Statistical summaries of IP traffic are at the heart of network operation and are used to recover information on arbitrary subpopulations of flows. It is, therefore. of great importance to collect the most accurate and informative summaries given the router's resource constraints. IP packet streams consist of multiple interleaving IP flows. While queries are posed over the set of flows, the summarization algorithm is applied to the stream of packets. Aggregation of traffic into flows before summarization is often infeasible and, therefore, the summary has to be produced over the unaggregated stream. Cisco's sampled NetFlow, based on aggregating a sampled packet stream into flows, is the most widely deployed such system.


Two sources of inefficiency have been observed in the prior art methods. First, a single parameter (the sampling rate) is used to control utilization of both memory and processing/access speed, which means that it has to be set according to the bottleneck resource. Second, the unbiased estimators are applicable to summaries that in effect are collected through uneven use of resources during the measurement period (information from the earlier part of the measurement period is either not collected at all and fewer counter are utilized or discarded when performing a sampling rate adaptation).


The present invention provides algorithms that collect more informative summaries through an even and more efficient use of available resources. The heart of this approach is a novel derivation of efficiently-computable unbiased estimators that use these more informative counts. It has now been analytically proven that these estimators are superior (have at most the same variance on all packet streams and subpopulations) to prior art approaches. Simulations on Pareto distributions and IP flow data show that the summaries of the present invention provide significantly more accurate estimates. The implementation designs of the present invention can be efficiently deployed at routers.


In one embodiment, the present invention provides a method of obtaining a sketch of an unaggregated packet stream comprising aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate; counting the aggregated packets using Adaptive Sample-and-Hold (ASH); adjusting the sampling rate based on a quantity of flows to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps; and transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate.


The method can further comprise calculating an adjusted weight of each flow using:








A
sSH



(
n
)


=



(

1
-

p
1


)

+




i
=
1

r




n
i

(

1
-




h
=
1

i



c

h
,
h




)




1
-




h
=
1

r



c

h
,
h









r being a total quantity of steps,


n=(n1, . . . , nr) such that ni is the number of packets counted from the flow in step i, and ch,h(h=1, . . . , r) are defined by:


c1j=(1−pj) for 1≦j≦r,


c2j=(1−pj)n−1(c1j−c1,1) for 2≦j≦r,


cij=(1−pj)n1−1(ci−1,j−ci−1,i−1) for 3≦i≦j≦r,


p1> . . . >pr is the sampling rate at step i=1, . . . r.


The adjusted weight of the flow represents an estimate of the size of the flow.


The method can further comprise summing the adjusted weights of each flow in a subpopulation of flows to obtain a size of the subpopulation of flows. The subpopulation of flows can be associated with at least one of a protocol, source, and application.


In one embodiment, the method can further comprise sampling all packets at a fixed rate pbase to obtain a pbase-sampled stream to reduce the packet stream before aggregating and counting.


In one embodiment, the method can further comprise decreasing the sampling rate in response to i) a quantity of cached flows being equal to a maximum quantity of cached flows, and ii) a sampled packet not being associated with a cached flow, using three tunable parameters μ, pstart and pbase, wherein 0≦μ≦1, pbase≦1 and pstart≦pbase and sampling rates are of the form (pstart/pbase) μt where t is a nonnegative integer. In this embodiment, the method can further comprise calculating an adjusted weight of a flow using:








A
sSH



(
n
)


=



(

1
-

p
1


)

+




i
=
1

r




n
i

(

1
-




h
=
1

i







c

h
,
h




)




1
-




h
=
1

r



c

h
,
h









r being a total quantity of steps,


n=(n1, . . . , nr) such that ni is the number of packets counted from the flow in step i, and ch,h(h=1, . . . , r) are defined by:


c1,j=(1−pj) for 1≦j≦r,


c2,j=(1−pj)n−1(c1j−c1,1) for 2≦j≦r,


ci,j=(1−pj)n1−1(ci−1,j−ci−1,i−1) for 3≦i≦j≦r,


p1> . . . >pr is the sampling rate at step i=1, . . . r.


In another aspect, the invention provides a method of obtaining an unbiased estimate of a quantity of flows of size i in a packet stream comprising aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate; counting the aggregated packets using Adaptive Sample-and-Hold (ASH); adjusting the sampling rate based on a count of the aggregated packets to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps; transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate; calculating the unbiased estimate αiSSH(p,n),


p being a sampling rate vector for a flow with count vector n and







0
<
i





h
=
1

r



n
h



,




wherein








if







n



=
1














then







α
1
sSH



(

p
,
n

)



=

1
/

p
r



,






if






n
r


=



n


>
1















then







α


n


sSH



(

p
,
n

)



=

1
/

p
r
















and







α



n


-
1

sSH



(

p
,
n

)



=


-

(

1
-

p
τ


)


/


p
r

.



,






for





l

=
3

,





,

r
-
1

,






for





l

=


2





if






n
1


>
1


,






and





for





l

=


n
r

>
0















then


:








α




h
=
l

r



n
h


sSH



(

p
,
n

)



=





-

c

l
,
l





q
sSH



[

n

n

]



.




if







n
1


=
1


,






then







α




l
=
2

r



n
h


sSH



(

p
,
n

)



=





-

(

1
-

p
2


)




q
sSH



[

n

n

]



.




if







n
1


>
1


,






then







α


-
1

+




h
=
1

r



n
h



sSH



(

p
,
n

)



=


-

(

1
-

p
1


)




q
sSH



[

n

n

]












α




h
=
1

r



n
h


sSH

=

1


q
sSH



[

n

n

]















and







q
sSH



[

n

n

]



=

1
-




h
=
1

r



c

h
,
h








wherein ch,h (h=1, . . . , r) is defined by:


c1,j=(1−pj) for 1≦j≦r


c2,j=(1−pj)n−1(c1j−c1,1) for 2≦j≦r


ci,j=(1−pj)n1−1(ci−1,j−ci−1,i−1) for 3≦i≦j≦r.


In one embodiment, the flows of size i belong to one subpopulation of flows.


In another aspect, the invention provides a method of obtaining a sketch of an unaggregated packet stream comprising aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate; counting the aggregated packets using Adaptive NetFlow (ANF); adjusting the sampling rate based on a quantity of flows to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps; transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate; and calculating an adjusted weight of cached flows using the count of aggregated packets.


The method can further comprise calculating the adjusted weight of each flow using:








A
sNF



[
n
]


=





j
=
1

r





n
j


p
j




(





h
=
1

r



p
h

n
h



-




l
=
2

j



d

l
,
l




)








h
=
1

r



p
h

n
h



-




j
=
2

r



d

j
,
j









di,j(p, n)(2<i<j<r) are defined as follows.










2

j


r


:







d

2
,
j




=



(



p
1

-

p
j



p
1


)


n
1







h
=
1

r



p
h

n
h











3

i

j


r


:







d

i
,
j




=



(



p

i
-
1


-

p
j



p

i
-
1



)


n

i
-
1





(


d


i
-
1

,
j


-

d


i
-
1

,

i
-
1




)









for 2≦i≦j≦r, di,j(p, n) is the probability that all packets of flow n have rank values below the sampling rate at packet arrival time, that the flow is fully counted by SNF until the transition into step i, and that at the beginning of step i, the rank of the flow is at least pj, wherein p1, . . . , pr are steps of the sampling rate and n1, . . . , nr are the corresponding counts of each step.


The method can further comprise summing the adjusted weight of each flow in a subpopulation of flows to obtain the size of the subpopulation of flows. The subpopulation of flows can be associated with at least one of a protocol, source, and application.


In one embodiment, the method can further comprise decreasing the sampling rate in response to i) a quantity of cached flows being equal to a maximum quantity of cached flows, and ii) a sampled packet not being associated with a cached flow, using three tunable parameters μ, pstart and pbase, wherein 0<μ≦1, pbase≦1 and pstart≦pbase and sampling rates are of the form (pstart/pbase) μt where t is a nonnegative integer.


In one embodiment, the method of can further comprise calculating an adjusted weight using:








A
sNF



[
n
]


=





j
=
1

r





n
j


p
j




(





h
=
1

r



p
h

n
h



-




l
=
2

j



d

l
,
l




)








h
=
1

r



p
h

n
h



-




j
=
2

r



d

j
,
j









r being a quantity of steps, p1> . . . >pr being corresponding sampling rates, ni being the number of packets counted from the flow in step i.


A system and computer-readable medium in accordance with the present invention, which incorporate at least some of the preferred features, is intended to be within the scope of the present invention. The system may be implemented using at least one of a microprocessor, a microcontroller, programmable logic, and/or an application specific integrated circuit (ASIC) with or without software and/or firmware. The computer-readable medium may include a compact disc (CD), digital video disc (DVD), and/or tape, which include instructions that when executed by at least one computing device performs the methods in accordance with the present invention.


Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed as an illustration only and not as a definition of the limits of the invention.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows the expected counts of two 100-packet flows. Flow A has 50 packets with current sampling rate 0.5 and 50 packets with current rate 0.1. Flow B has 100 packets with current sampling rate 0.5. The final counts with ANF and ASH only depends on the final sampling rate. SNF and SSH benefit from the higher sampling rate at the beginning of the measurement period and the final counts account for more packets.



FIG. 2 shows the fraction of packets belonging to the i heaviest flows generated in the simulation described in section 8.1.



FIG. 3A shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. The subpopulations consist of top flows pbase=1, μ=0.9,pstart=1, top-16. The Pareto distribution has parameter α=1.1.



FIG. 3B shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. The subpopulations consist of top flows pbase=1, μ=0.9, pstart=1, top-64. The Pareto distribution has parameter α=1.1



FIG. 3C shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. The subpopulations consist of top flows pbase=1, μ=0.9, pstart=1, top-64. The Pareto distribution has parameter α=1.4.



FIG. 4A shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. Estimating subpopulations of IP flows for 80 port numbers, pbase=1, μ=0.9, pstart=1.



FIG. 4B shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. Estimating subpopulations of IP flows for 3818 port numbers, pbase=1, μ=0.9, pstart=1.



FIG. 4C shows a comparison of the accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH and SSH. Estimating subpopulations of IP flows for 53 port numbers, pbase=1., μ=0.9, pstart=1.



FIG. 5A shows sweeping pbase to evaluate hybrid algorithm. Estimating subpopulations of top-64 flows for Pareto 1.1, k=400, pstart=pbase, μ=0.9.



FIG. 5B shows sweeping pbase to evaluate hybrid algorithm. Estimating subpopulations of top-64 flows for Pareto 1.4, k=400, pstart==pbase, μ=0.9.



FIG. 6A shows sweeping pbase to evaluate the tradeoffs in the hybrid algorithms. Fraction of packets in the pbase-sampled stream that are counted (left). Fraction of total packets that are counted (right). The figure shows subpopulations of top-64 flows for Pareto 1.1, k=400,pstart=pbase, μ=0.9.



FIG. 6B shows sweeping pbase to evaluate the tradeoffs in the hybrid algorithms. Fraction of packets in the pbase-sampled stream that are counted (left). Fraction of total packets that are counted (right). The figure shows subpopulations of top-64 flows for Pareto 1.4, k=400, pstart=pbase, μ=0.9.



FIG. 7A shows sweeping μ to evaluate how it affects the (average absolute value of the) relative error. The figure shows subpopulations of top-64 flows for Pareto 1.1, pstart=pbase=1, k=400.



FIG. 7B shows sweeping μ to evaluate how it affects the (average absolute value of the) relative error. The figure shows subpopulations of top-64 flows for Pareto 1.4, pstart=pbase=1, k=400.



FIG. 8A shows sweeping μ to evaluate effectiveness decrease. Number of rate adaptations are compared for Pareto α=1.1, k=400 and Pareto α=1.4, k=400, pstart=pbase=1.



FIG. 8B shows sweeping p to evaluate effectiveness decrease. Number of counts for NF, SH, SNF and SSH, pstart=pbase=1, k=400.





DETAILED DESCRIPTION OF THE INVENTION

1. Overview


In one embodiment, the present invention includes sketching algorithms for packet streams that obtain considerably more accurate statistics than existing approaches. The sketches can be used for many types of queries, such as, subpopulation-size queries (number of packets of a subpopulation), and bytes and flow size distribution. Available resources are used in a balanced and load-sensitive way to collect more information from the packet sample. In a further embodiment, the present invention includes unbiased estimators that use the additional information. The algorithms of the present invention are robust to anomalies and changes in traffic patterns, and gracefully degrade performance when there is a decrease in available resources. They are supported by rigorous analysis.


Step counts for NF and SH. NF, SH, and their adaptive variants do not equally utilize available resources through the measurement period: The number of cached flows increases through the measurement period and reaches its maximum only at the end. The adaptive ANF and ASH fully utilize all counters, but this utilization is in a sense “wasted” and does not translate into more accurate estimates, as each rate adaptation (decrease of the sampling rate) is implemented by discarding the more informative counts obtained with the lower sampling rate [13, 11].


Step-counting NetFlow (SNF) and step-counting sample-and-hold (SSH) process the same packets as their adaptive counterparts, but when performing rate adaptation, they retain the current counts. SSH and SNF build on a simple but powerful design [20, 18] of transferring partial counts from (fast and expensive) SRAM to (slower and cheaper) DRAM, which allows us to use smaller size counters in SRAM and add the counts to larger DRAM counters when the SRAM counters are about to overflow. This design allows one to distinguish between the resources required for active counting and those required for intermediate storage. While applicable to all methods, SNF and SSH are able to make a further use of this design by transferring, after each rate adaptation, the counts into DRAM. Counting more of the processed packets in the final summary is the key for obtaining better estimates.


Hybrids of NF and SH. There are multiple resource constraints for gathering statistics. At the router, the memory size that determines the number of statistics counters and the CPU processing (or size of specialized hardware) that determines the fraction of packets that can be examined against the flow cache. Other constraints are the available bandwidth and storage to transmit and store the final sketch. Previous schemes, however, use a single parameter (sampling rate) with these multiple constraints: NF (and ANF and SNF), must set (or adjust) the sampling rate to be low enough so that the number of counters does not over flow or over utilize the router memory. As a result, resources available for processing packets may not be fully utilized. SH (and ASH and SSH), on the other hand, do not address CPU processing constraints at all, and all packets are processed. The present invention includes hybrid schemes of SH variants that use two packet sampling rates. The first one controls the fraction of packets that are processed in order to determine if they belong to an already-cached flow. The second, and lower, rate, determines the fraction of packets that can create new entries of cached flows.


Subpopulation weight estimators. (Section 4) The sketches of the present invention have the form of a subset of the flows along with the flow attributes and an adjusted weight associated with each flow. Adjusted weights have the property that for each flow, the expectation is equal to its actual size. (Adjusted weights of flows not included in the sketch are defined to be zero). Therefore, an unbiased estimate for the size of a subpopulation of flows is obtained by summing the adjusted weights of flows in the sketch that belong to this subpopulation. The per-flow unbiasedness property is highly desirable as accuracy increases when aggregating over larger subpopulations and when combining estimates obtained from sketches of different time periods. The invention provides the calculation and analysis of unbiased adjusted weights.


The derivation of adjusted weights for NF, which applies fixed-rate sampling, is standard: a simple scaling of the counts by the inverse sampling rate. The present invention provides adjusted weights assignments for ANF, ASH, SSH and SNF. These assignments can be computed efficiently. The present specification describes what information to gather and how to use it to obtain correct adjusted weights. The derivation and efficient computation of correct unbiased adjusted weights for SNF and SSH are novel and highly nontrivial. The adjusted weights have minimum variance among all estimators that use the same information (the counts gathered by the algorithm for the flow), and in this sense are optimal.


The quality of the adjusted weight assignment depends on the distribution over subsets of flows that are included in the sketch, the information collected by the algorithm for these flows, and the procedure used to calculate these weights. The distribution of the subsets of flows included in the sketch produced by each of the algorithms NF, SH, hybrids, and variants, is that of drawing a weighted sample without replacement (WS) from the full set of aggregated flows. Therefore, the difference in the quality of the sketches stems only from the variance of the adjusted weights assigned. More informative counts are beneficial only if they correspond to adjusted weights with lower variance. In this specification, the variance of the adjusted weight assignment is analyzed and a strong relation between the different methods that holds for any packet stream and any flow or subpopulation of flows is established: The SSH estimator has at most the variance of ASH and of SNF, and SNF has at most the variance of ANF.


FSD and other subpopulation properties. (Sections 5 and 6) There are multiple aggregates of interest over subpopulations and it is important that the same summaries can support queries for these aggregates. In this specification, unbiased estimators for important classes of aggregates are derived. Flow Size Distribution (FSD) estimators, that provide unbiased estimates on the number of distinct flows of certain range of sizes in a subpopulation are derived in Section 5. Estimators for other properties such as total bytes or total number of AS hops to destination are derived in Section 6. For a cleaner exposition, lengthy or technical proofs are deferred to Section 9.


Implementation. The implementation design piggybacks on several existing ingredients. The basis is the flow counting mechanism that Cisco's NF deploys. (Proposed improved implementation such as [18, 11] can also be integrated.) A router implementation of adaptive sampling rate for ANF was proposed in [11, 16] (rate adaptation was termed renormalization). This design can also be used for ASH and the step-counting and hybrid variants.


Discretized sampling rates. (Section 7) The pure adaptive models perform a rate adaptation each time a flow is “evicted” from the cache. Rate adaptations, however, are intensive operations [11, 16]. The present invention provides a “router friendly” variant of the pure model with discretized sampling rates. This design drastically reduces the number of rate adaptations and also simplifies their implementation. As in [11], discretization allows efficient rate adaptations. The discretized model, however, differs mathematically from the pure sampling schemes. In this specification, it is shown how to apply the estimators derived for the pure schemes to the discretized schemes. More importantly, it is shown that these estimators are also unbiased and retain other key properties of the estimators for the pure model. Furthermore, the particular discretization used was critical for the unbiasedness arguments to hold.


Performance study. (Section 8) In this specification, the performance of these methods on IP flows data collected by unsampled NF running on a gateway router and on synthetic data obtained using Pareto distribution with different parameter values is evaluated. On the IP data, subpopulations of flows that belong to specified applications are considered; and on the synthetic data, prefixes and suffixes of the flow size distribution are considered. The step-counting SNF and SSH provide significantly more accurate estimates than their adaptive counterparts. The SH variants significantly dominate their NF counterparts and the hybrid version provides a smooth performance curve between these two extremes. Even with low sampling rates, the hybrids are able to provide much more accurate estimates than plain NF, ANF, and SNF. In the specification, it is also shown that the implementation design of the invention can be tuned to provide a very low number of rate adaptations.


2. Related Work


An orthogonal summarization problem is summarizing aggregated data [14]. For example, using k-mins or bottom-k sketches [1, 4, 7, 5, 10]. Estimators developed for these summaries utilize the weight of each item, which is not readily available in an unaggregated setup. Direct application requires pre-aggregation, that is, obtaining an exact packet count for each flow as when running unsampled NF. This is infeasible in high volume routers as it requires processing of every packet and storing an active counter for every flow. These methods can be used, however, to trim the size of a sketch obtained using any method that obtains unbiased adjusted weights (including NF, SH, and their variants), when trimming is needed in order to address transmission bandwidth or storage constraints.


An extension of ASH that does not discard counts when a rate adaptation is performed was considered in [12] finding “elephant flows.” While this extension attempts to provide similar benefit to step-counting, it is not adequate for estimating subpopulation sizes. The unadjusted count itself is indeed a better estimator than the reduced count for each individual flow, but this estimator is inherently biased. The bias depends on where in the measurement period the packets occurred, and an unbiased estimator can not be constructed from the counts collected. The relative bias is very large on smaller flows (of the order of the inverse sampling-rate) and if used to estimate subpopulation sizes for such flows, a large relative error on such subpopulations (even is the subpopulation size is large) can be obtained.


Kumar et al [17] proposed a streaming algorithm for IP traffic that produces sketches that allow us to estimate the flow size distribution (FSD) of subpopulations. Their design executes two modules concurrently. The first is a sampled NetFlow module that collects flow statistics, along with full flow labels, over sampled packets. The second is a streaming module that is applied to the full packet stream and uses an array of counters, accessed by hashing. Estimating the flow size distribution is a more general problem than estimating the size of a subpopulation, and therefore this approach can be used to estimate the subpopulations sizes. To be accurate, however, the number of counters in the streaming module should be roughly the same as the number of flows and therefore the size of fast memory (SRAM) should be proportional to the number of distinct flows.


In some cases, protocol-level information such as testing for the TCP syn flag [9] on sampled packets and using TCP sequence numbers [19] can be used to obtain better estimates of the size of the flow from sampled packets. These methods can significantly increase the accuracy of estimating the flow size distribution of TCP flows from packet samples, but are not as critical for subpopulation size estimates for subpopulations with multiple flows. In some embodiments, these methods can be integrated with the sketches of the present invention.


3. Sketching Algorithms


The present invention provides the underlying mathematical models of different flow sampling schemes. These models are used in the analysis and are mimicked by the “router friendly” implementations. The sampling schemes are data stream algorithms that are applied to a stream of packets.


Sampled NF performs fixed-rate packet sampling. Packets are sampled independently at a rate p and sampled packets are aggregated into flows. All flows with at least one sampled packet are cached and there is an active counter for each flow. The sketch includes all flows that are cached in the end of the measurement period.


SH, like NF, samples packets at a fixed rate p and maintains a cache of all flows that have at least one sampled packet. SH, however, processes all packets and not only sampled packets. If a processed packet belongs to a cached flow, it is counted.


Rank-Based View of the Sample Space


The analysis is facilitated through a rank-based view of the sample space: Each point in the sample space is a rank assignment, where each packet is assigned a rank value that is independently drawn from U [0,1]. The actions of each of the sampling algorithms that are considered are defined by the rank assignment. Implementations do not track per-packet random rank values or even draw rank values. They maintain just enough “partial” information on the rank assignment to maintain a flow cache and counts that are consistent with the rank-based view.


For each flow fεF and position in the packet stream, the current rank value r(f) is defined to be the smallest rank assigned to a packet of the flow that occurred before the current position in the packet stream.


An NF sketch with sampling rate p is equivalent to obtaining a rank assignment and counting all packets that have rank value <p. The set of actively counted flows at a given time is {fεF|r(f)<p}.


An SH sketch with sampling rate p is equivalent to obtaining a rank assignment and counting all packets such that the current rank of the flow (including the current packet) at the time the packet is processed is smaller than p.


Adaptive Algorithms


The adaptive algorithms ANF and ASH work with a fixed limit k on the number of cached flows and produce a sketch of k flows. When the number of cached flows exceeds k, the sampling rate is “retroactively” decreased, and counts are adjusted, so that only k flows remain cached. The current sampling rate is deemed to be the (k+1)st smallest rank among r(f) (fεF) (it is defined to be 1 if there are fewer than (k+1) distinct flows.)


It is sometimes necessary to set a limit pstart<1 on the initial sampling rate. In this case, the current sampling rate is defined to be pstart if there are fewer than (k+1) distinct flows and otherwise is the minimum of pstart and the (k+1)st smallest rank among r(f)(fεF).


The sampling rate is determined by the rank assignment, the prefix of processed packets, and pstart (it does not depend on the sampling scheme). The effective sampling rate is defined as the value of the sampling rate at the end of the measurement period.


The set of cached flows at a given time (by either ANF or ASH) are the flows with current rank that is below the current sampling rate. The (current) ANF count of a cached flow is the number of packets seen so far with rank that is below the current sampling rate. The (current) ASH count of a cached flow f is the number of packets seen so far such that the rank of the flow just after the processing of the packet is below the current sampling rate.


The sketch includes the set of cached flows and their counts at the end of the measurement period.


Step-Counting


A decrease of the current sampling rate is referred to as rate adaptation. The adaptive algorithms [13, 11] implement rate adaptation by decreasing the more informative flow counts that corresponded to the higher sampling rate. The step-counting algorithms, SNF and SSH, record these counts instead of adjusting them down. The active counting of packets performed by the step-counting algorithms is just like their adaptive counterparts, but the step-counting algorithms produce a vector of counts, rather than a single count, for each flow in the sketch.


Using the rank-based view, SNF counts include all packets such that (i) the rank of the packet is below the value of the sampling rate when (just after) the packet is processed (ii) the rank of the flow remains continuously below the sampling rate since the packet was processed until the current time. SSH counts include all packets such that when (just after) the packet is processed and continuously until the current time, the rank of the flow is below the sampling rate. With both SNF and SSH, a flow is cached if and only if its rank is below the current sampling rate. FIG. 1 motivates, through an example, the design of the step-counting algorithms. The figure shows two flows and the expected number of packets included in the final count by each method. The step-counting SNF and SSH count many more packets than their adaptive counterparts.


Hybrids



FIG. 1 shows that ASH and SSH count many more packets than ANF and SNF. This advantage, however, comes at a cost: ANF and SNF simply ignore all packets that are not sampled while ASH and SSH have to process all packets in order to determine if they belong to a cached flow. The hybrid algorithms of the present invention provide a smooth tradeoff between the fraction of packets that are processed and the fraction that are included in the final count.


Hybrid sketching algorithms use a base sampling rate parameter pbase, which controls the fraction of packets that are processed by the algorithm. The initial sampling rate is pstart≦pbase. A hybrid algorithm samples all packets independently at a fixed rate pbase and then applies a respective basic algorithm (SH, ASH, or SSH) to the pbase-sampled stream with initial sampling rate P′start=pstart/pbase. (Hybrid NF variants with pstart≦pbase are equivalent to applying the underlying NF variant and therefore only hybrid SH variants are considered.)


The rank-based view of the hybrid algorithms is as follows. Hybrid-ASH counts include a packet if and only if (i) the rank of the packet is below pbase and (ii) the rank of the flow at the time (just after) the packet is processed is below the current sampling rate. Hybrid-SSH counts include a packet if and only if (i) the rank of the packet is below pbase and (ii) continuously, from (just after) the time the packet is processed until the current time, the rank of the flow was below the sampling rate. A flow is cached with hybrid-ASH and hybrid-SSH if and only if its rank value is below the current sampling rate.


An equivalent rank-based view of the hybrid algorithms discards all packets with rank value above pbase, scales the rank values of the remaining packets and pstart by pbase−1, and applies the respective basic algorithm.


The following table shows the expected number of packets that are counted and processed for the example 100-packet flows in FIG. 1. The hybrids use pstart=pbase=0.5 and have respective sampling rates of 1 and 0.2 on the pbase-sampled stream. The step-counting algorithm counts more of the processed packets than their adaptive counterparts. The hybrids provide a tradeoff that preserves the higher ratios between counted and processed packets.
















A
B




















ANF
10/30
10/50



ASH
≈91/100
≈91/100



hybrid-ASH
≈46/50 
≈46/50 



SNF
≈30/30 
≈50/50 



SSH
≈99/100
≈99/100



hybrid-SSH
≈50/50 
≈50/50 










4. Adjusted Weights


The information collected by the algorithms is used to compute adjusted weights that are associated with each flow that is included in the sketch (flows that are not in the sketch have an adjusted weight of zero).


The notation AL(f) is used, where L E{ASH,ANF,SSH,SNF,NF,SH}, for the random variable that is the adjusted weight assigned to the flow f by the algorithm L. The adjusted weights assigned are a function of the counts collected by the algorithm and of the sampling rate.


Clearly, a correct adjusted weight for NF counts for a flow f with count i(f) is ApNF(f)=i(f)/p (the number of counted packets divided by the sampling rate p). The derivation of the adjusted weight assignments for the adaptive algorithms is more subtle and based on partitioning the sample space as in [4, 5, 10]. This partitioning allows application of the adjusted weights expressions that are applicable to the corresponding fixed-rate variants.


It has been found that there is a unique deterministic assignment of adjusted weights for each of the algorithms considered. Since deterministic assignment has smaller variance than any randomized one, it is preferable.


Lemma 4.1. Let i(>) be the packet count collected for a flow f by ANF.


Ap′ANF(f)=i(f)/p′. where p′ is the effective sampling rate, are correct adjusted weights.


Proof. Consider a flow f, and the probability subspace where the kth smallest rank among r(f′) (f′εF\{f}) is p′. Consider the conditional distribution of the number of packets of flow f that are counted. The number of packets is just like what would have been counted with NF with rate P. Therefore, Ap′ANF(i(f))=ApNF(i(f)) are unbiased adjusted weight for f within this probability subspace.


Lemma 4.2. Let i(f) be the number of counted packets for a flow f with SH. The assignment ApSH(f)=i(f)+(1−p)/p if i(f)>0 (the flow is sampled) are correct adjusted weights.


Proof ApSH(i). the adjusted weight assigned to a flow with count of i packets has been derived (the superscript and subscript is omitted when clear from context) and it is shown that this is the unique deterministic assignment.


Ap(0)=0 (items that are not sampled at all obtain zero adjusted weight). In order for the assignment to be unbiased for 1-packet flows, pAp(1)+(1−p)Ap(0)=1. Substituting Ap(0), yields Ap(1)=1/p.


To be correct for n-packet items, Σi=0n(1−p)ipAp(n−i)=n.


These are solved for n=2, 3, 4 . . . to obtain that Ap(n)=(1+(n−1)p/p=(1−p)/p+n for n≧1.


This assignment can also be derived by applying the Horvitz-Thompson estimator to each packet. For each packet, the partition of the sample space to two parts is looked at, one where a previous packet is sampled, and the other where a previous packet is not sampled. The adjusted weight assigned to a packet is unbiased on each part: if a previous packet is sampled, the probability that a packet is counted is 1 and its adjusted weight is 1. If no previous packet is sampled, then the probability that the packet is sampled is p and the Horvitz-Thompson adjusted weight is 1/p. The adjusted weight of the flow is the sum of the adjusted weights of sampled packets. This assignment can be interpreted as the first sampled packet of the flow representing 1/p unseen packets whereas subsequent counted packets of the flow represent only themselves.


Lemma 4.3. Consider ASH and let i(f) be the ASH count of a flow and p′ be the effective sampling rate. The assignment Ap′ASH(f)=i(f)+(1−p′)/p′(if i(f)>0) are correct adjusted weights.


Proof. The proof is similar to that of Lemma 4.1: For each flow, the probability subspace, where the kth smallest rank among the flows F\{f} is fixed, is considered and unbiased weights within this subspace are assigned.


The information collected using SNF and SSH is the step function 1≧p1>p2> . . . >pr denoted by the vector p=(p1, . . . , pr) of the current sampling rate and for each sampled flow, the counts i(f)=(i1(f), i2(f), . . . ir(f)) of the number of packets recorded at each step. The adjusted weight assignment for a flow f is a function of p and i(f). The following notation is used






A
p
SNF(i(f))≡Ap1,p2, . . . , pr(i1(f),i2(f), . . . , ir(f))


for the adjusted weight assigned by SNF, and similarly, ApSSH(i(f)) for the adjusted weight assigned by SSH.


Adjusted weights are computed after the counting period is terminated. After they are computed, the count vectors can be discarded. Therefore, SNF and SSH produce a sketch of size k.


Theorem 4.4. The adjusted weight ApSNF(n) for SNF and ApSSH(n) for SSH can be computed using number of operations that is quadratic in the number of steps with a non-zero count.


The adjusted weights for SSH and SNF sketches are derived. The adjusted weights for ANF and ASH are based on “plugging in” the effective (final) sampling rate in the adjusted weights expressions of the non-adaptive variant. The argument for unbiasedness is based on the fact that the adjusted weights of each flow are unbiased on each part of some partition of the sample space. For the step-counting algorithms, the adjusted weights assigned to a flow f are unbiased in the probability subspace defined by the steps of the rank value of the current kth-smallest rank of a flow among F\f. These steps are the same as the current sampling rate when the flow is actively counted. Technically, the kth-smallest rank of an actively counted flow on steps that precede the active counting of f is considered. The adjusted weight function, however, has the property






A
p

1

,p

2

, . . . , p

r
(0, . . . , 0,ij,ij+1, . . . , ir)=Apj,pj+1, . . . , pr(ij,ij+1, . . . , ir)  (Eq. 1)


and therefore does not depend on the current sampling rate in the duration before the final contiguous period where the flow is actively counted. This means that it is sufficient to record the steps of the current sampling rate. Eq. (1) is an instance of the following generalization that states that the adjusted weight assignment does not depend on the values of the current sampling rate in durations when there are no counted packets.


Lemma 4.5. Consider a correct assignment of adjusted weight Ap(n). For an observed count i and p, let 1≦j1<j2< . . . <jr′=r be the coordinates such that ijk>0 or ijk=r (that is, r is included also if ir=0).






A
p

1

,p

2

, . . . , p

r
(0, . . . , 0,ij1,0,ij2, . . . )=Apj1,pj2, . . . , pjr′=pr(ij1,ij2, . . . , ijr′)  (Eq. 2)


The lemma allows statement of the adjusted weight of a flow in terms of an equivalent flow where the number of steps is equal to the number of steps where the original flow had a nonzero count. It also allows the assumption, without loss of generality in the analysis, that all steps except possibly the last step have positive counts.


4.1 Adjusted Weights for SSH


Let r be the number of steps and p1> . . . >pr the corresponding sampling rates. For a flow f let n=(n1, . . . , nr) be the number of packets of f in each step and let i=(i1, . . . , ir) be the number of counted packets in each step. The probability that a flow with n packets has a count of i is denoted by q[i|n].


Expressions for the adjusted weights for SSH and SNF sketches that can be computed in time quadratic in the number of steps (which is logarithmic in the number of packets) are provided. It is then argued that the number of operations can be further reduced to be quadratic in the number of steps where the flow has a non-zero count. This distinction is important since many flows, in particular bursty or small flows, can have non-zero count on a single step or very few steps.


The values cij(p,n) (1≦i≦j≦r) are defined as follows (the parameters (p,n) are omitted when clear from context, and it is assumed that n1>0 w.l.o.g.):





1≦j≦r: c1,j=(1−pj)





2≦j≦r: c2,j=(1p)n1−1(c1,j−c1,1)





3≦i≦j≦r: ci,j=(1−p)ni−1(ci−1,j−ci−1,i−1)


The following two lemmas are immediate from the definitions.


Lemma 4.6.• For 1≦j≦r, c1,j is the probability that the rank of the first packet of the flow is at least pj.

    • For 2≦i≦j≦r, c1,j (p,n) is the probability that the flow n is fully counted by SSH until the transition into step i, and at the beginning of step i, the rank of the flow is at least pj.


Lemma 4.7 The computation of the partial sums









h
=
1

i



c

h
,
h






for i=1, . . . , r can be performed in O(r2) operations.


By lemma 4.6, ci,i (iε{1, . . . , r}) is the probability that the SSH counting of the flow progressed continuously from the start until the transition into step i, and halted in this transition (as the current rank of the flow was above pi). So










q


[

n
|
n

]


=

1
-




h
=
1

r




c

h
,
h


.







(

Eq
.




3

)







The following theorem expresses the adjusted weight ASSH(n) as a function of the diagonal sums Σh=1ich,h(h=1, . . . , r) The proof is provided in Section 9.1.


Theorem 4.8








A

S
SH




(
n
)


=




(

1
-

p
1


)

+




i
=
1

r




n
i



(

1
-




h
=
1

i



c

h
,
h




)





1
-




h
=
1

r



c

h
,
h





.





Lemma 4.9. The adjusted weight ASSH(n) can be computed using O(r2) operations.


Proof. The proof follows from Lemma 4.7 and Theorem 4.8.


4.2 Adjusted Weights for Hybrids


Unbiased adjusted weights for hybrid-ASH and hybrid-SSH are obtained by scaling pbase−1 the adjusted weights computed for the non-hybrid variant that is applied to the pbase-sampled stream.


4.3 Adjusted Weights for SNF


di,j (p,n) (2≦i≦j≦r) is defined as follows.







2

j


r


:



d

2
,
j




=



(



p
1

-

p
j



p
1


)


n
1







h
=
1

r







p
h

n
h











3

i

j


r


:



d

i
,
j




=



(



p

i
-
1


-

p
j




p
i

-
1


)


n

i
-
1





(


d


i
-
1

,
j


-

d


i
-
1

,

i
-
1




)






For (2≦i≦j≦r), dij (p, n) is the probability that all packets of the flow n have rank values below the sampling rate at packet arrival time, that the flow is fully counted by SNF until the transition into step i, and that at the beginning of step i, the rank of the flow is at least pj.


The probability that all packets are counted by sNF is equal to Πh=1rphnh minus the probability that the counting halts at the transition into steps 2, . . . , r:











q

S
NF




[

n
|
n

]


=





h
=
1

r







p
h

n
h



-




j
=
2

r




d

j
,
j


.







(

Eq
.




4

)







Theorem 4.10.








A

S
NF




[
n
]


=





j
=
1

r





n
i


p
j




(





h
=
1

r







p
h

n
h



-




l
=
2

j



d

l
,
l




)








h
=
1

r







p
h

n
h



-




j
=
2

r



d

j
,
j









The proof of the Theorem is provided in Section 9.3.


The partial sums Σh=1idh,h for i=1, . . . , r can be computed in O(r2) operations, and therefore, using Theorem 4.10 the adjusted weight ASNF [n] can be computed in O(r2) operations.


Theorem 4.4 is an immediate corollary of the above (for SNF) and Lemma 4.9 (for SSH), using Lemma 4.5. (According to Lemma 4.5, when q[n|n] and the cij's or dij's are computed, all entries which are 0 in n (except for the last entry in n which remains even if it is 0) can be removed from n and p.)


4.4 Relation Between the Sketching Algorithms


The rank-based view shows that the distribution over subsets of flows included in the sketch is the same for ANF, ASH, SNF, SSH. The different algorithms applied with the same rank assignment result in the same set of k cached flows (or all flows if there are fewer than k distinct flows in the packet stream). The hybrid algorithms result in “almost” the same distribution: if the pbase-sampled packet stream contains fewer than k distinct flows then the sketch will only include those flows, but the included flows are a subset of the flows included in a sketch generated by the non-hybrid algorithms using the same underlying assignment.


This distribution is equivalent to weighted sampling without replacement of k flows (ws) (see, e.g. [6, 7]). Ws is performed as follows over the set of aggregated flows: repeatedly, k times, a flow is selected from the set of unsampled flows with probability proportional to its weight. Adjusted weights for Ws can be obtained using the rank conditioning or subset conditioning methods [4, 5]. These weights are computed using the exact packet count of each flow and therefore can not be obtained by a stream algorithm with size-k flow cache. These ws sketches are included in the evaluation in order to understand to what extent performance deviates in comparison. The rank-conditioning adjusted weight assigned to each flow is equal to its weight (the number of packets) divided by the probability that the flow is included in the sample in some probability subspace that includes the current sample. (This is the Horvitz-Thompson unbiased estimator obtained by dividing the weight of the item by the probability that it is sampled.) The probability subspace is defined as all runs that have the same effective sampling rate p′ and therefore the probability is equal to 1−(1−p′)|f|, where |f| is the number of packets in the flow and p′ is the effective sampling rate. Therefore, the adjusted weight is equal to |f|/(1−(1−p′)|f|).


Since these algorithms (see Table 1) share the same distribution, the difference in estimate accuracy stems from the adjusted weight assignment. The quality of the assignment depends on the information the algorithm gathers and the method applied to derive the adjusted weights. When the adjusted weights have smaller variance, the estimates obtained are more accurate. The relation of estimate quality between the different estimators/algorithms has been explored.









TABLE 1







Methods that obtain a sketch of size k that is a weighted


sample without replacement from the set of flows F.












alg
sketch size
active counters
counts collected







ANF
k
k
for k flows



ASH
k
k
for k flows



SNF
k
k
per-step for k flows



SSH
k
k
per-step for k flows



WS
k
|F|
for all flows in F










4.5 Covariances


An important property of the algorithms considered is zero covariances:


Lemma 4.11. Consider Lε{ASH, ANF, SSH, SNF, NF, SH} and two flows f1≠f2. Then COV(AL(i),AL(f2))=0.


(The proof is provided in Section 9.4.)


The zero covariance property is trivial for fixed-rate sampling (NF or SH), since each flow is selected independently. With the adaptive algorithms, however, the adjusted weights are not independent since inclusion of one flow makes it less likely for the other flow to be included. For ws, this property is established in [4].


The zero covariance property of the random variables AL(f)(fεF) implies that:


Corollary 4.12. For any J⊂F and Lε{ASH, ANF, SSH}







VAR


(


A
L



(
J
)


)


=


VAR
(




f

J





A
L



(
f
)



)

=




f

J





VAR


(


A
L



(
f
)


)


.







Therefore, to show that an adjusted weight assignment has lower variance than another on all subpopulations, it suffices to show lower variance on all individual flows.


4.6 Variance of Adjusted Weights


An algorithm dominates another, in terms of the information it collects on each sketched flow, if its output can be used to emulate an output of the second algorithm. It is not hard to see that SNF dominates NF, that SSH dominates both ASH and SNF (and therefore also dominates NF), that SNF and ASH are incomparable, and that they are all dominated by ws. Therefore, SSH sketches are the most powerful and ANF sketches are the least powerful. The variance of the adjusted weight assignments rejects this dominance relation, with lower variance for the methods that gather more information.


Theorem 4.13. For any packet stream and any flow f, the following relation between the variance of the adjusted weight assignments for f holds.






VAR(AWS(f))≦VAR(ASSH(f))≦VAR(AASH(f))≦VAR(AANF(f))  (Eq. 5)






VAR(ASSH(f))≦VAR(ASNF(f))≦VAR(AANF(f))  (Eq. 6)


The proof is provided in Sections 9.2 and 9.3. The relation also holds to the fixed-rate variants of the algorithms (when the sampling rate or rate steps are fixed).


A variance relation also holds for the hybrids: the variance is non-increasing with the packet-processing rate pbase.


4.7 Estimators with Negative Covariances


The adjusted weights assignments ApL(n) were a function of the observed counts of the flow and the “sampling rate” (or sampling rate steps). Estimators that utilize different information are considered: the counts collected for other flows in the sketch and the total packet count of the stream.


The selectivity of a packet is 1/w(F), selectivity of a flow is ρ(f)=w(f)/w(F), and the selectivity of a subpopulation J is ρ(J)=w(J)/w (F). When the total weight w(F) is known, subpopulation weight and selectivity queries are equivalent: An estimator for subpopulation weight is obtained by multiplying the subpopulation selectivity estimator with w(F) and vice versa, by dividing the adjusted weight estimator with w(F).


Adjusted selectivities, RL( ) are unbiased estimators for selectivity. Adjusted selectivity estimators are derived for the adaptive algorithms that are based on the observed counts of all flows but do not depend on w(F). Adjusted weight assignments A+L( ) are derived for the adaptive algorithms that depend on w(F), and the observed counts of all flows.


Estimators for ANF and ASH sketches are derived. (Estimators for SNH and SSH sketches can be obtained using the same methodology.) The per-packet adjusted weights are stated, as this is a more general form (proofs are provided in Section 9.6).












A

+

A

NF





(

v
,

n


:


F

,

w


(
F
)



)


=


w


(
F
)



n


(
F
)


















if





the





packet





v





is





counted





and





0






otherwise
.











R

A

NF




(

v
,

n


(
F
)



)


=

1

n


(
F
)















if





the





packet





v





is





counted





and





0






otherwise
.




For






ASH

,















A

+

A

SH





(

v
,

n


:


F

,

w


(
F
)



)


=



w


(
F
)


-

n


(
F
)


+
k

k


,




if v is the first-counted packet of a flow.


A+ASH(v, n: F, w(F))=1, if v is counted but is not the first-counted packet of a flow.


A+ASH(v, n F, w(F))=0, if v is not counted.


Adjusted weight assignments can be incomparable. An assignment A1(f) is considered to be at least as good as A2(f) if A1( ) has at most the variance of A2( ) on any subpopulation. A sufficient condition is that for all fεF, VAR (A1(f))≦VAR (A2(f)) and for all f1≠f2, COV(A1(f1),A1(f2))≦COV(A2(f1),A2(f2)).


The adjusted weights assignments A+L(f) are such that


1. For each f, VAR(A+L(f))<VAR(AL(f)),


2. For f1≠f2, COV (A+L(f1), A+L(f2))≦0, and


3. Σf1εFΣf2εFCoV(A+L(f1),A+L(f2))=0. (A+L(F)≡w(F)).


These properties imply that A+L(f) is better than AL(f) (at least as good on any subpopulation and better on some subpopulations). A case for these properties was made in [4, 5] for aggregated data, where there is a similar use of the total weight of the dataset to derive tighter estimators with negative covariances between subsets and zero sum of variances. These properties are also motivated by an interesting relation that shows that the variance of an “average” subset is a linear combination of the variance of the sum and the sum of variances [21].


These properties can not be obtained for fixed-rate sampling algorithms such as NF and SH: Since there is positive probability of an empty sample, it is not possible to have (unbiased) adjusted weights such that A+L(F)≡w(F). The relation A+L(F)≡w(F) is immediate from the definitions and the variance relations are established in Section 9.6.


5. FSD Estimators


A flow attribute that is lost when there is no pre-aggregation is the size of the flow (exact number of packets or bytes). This could be an important attribute for some aggregations, for example, to trace the origin of port scanning or worm activity one may want to aggregate over all flows that originate from a certain AS and have at most 10 packets. One also may want to estimate the number of flows in a subpopulation that are within a certain range of sizes.


FSD estimation is facilitated by assigning adjusted FSD estimators αiL( ) (i≧1) such that for any flow f, E(α|f|L(f))=1 and for i≠|f|, E(αiL(f))=0. Similarly to adjusted weights, αiL( )=0 for flows that are not included in the sketch. An unbiased estimator of the number of flows of size i in a subpopulation J is ΣfεJαiL(f). By summing the estimators αiL( ) over a desired range of values iεR, unbiased estimates for the number of flows in this range in the subpopulation are obtained.


An important special case is the total number of flows in a subpopulation, which can be estimated using adjusted counts #L( ) (for any flow f, E(#L(f))=1). Adjusted counts from adjusted FSD estimators can be obtained using #L(p, n)=Σi>1αiL(p, n).


Lε{NF, ANF} Let Oi be the random variable representing the number of flows of count i with NF (or ANF). Let p be the sampling rate (or effective sampling rate), and let Ci be the number of flows of weight i.


For i≧1, the expectation of Oi is piCi+i(1−p)pi+1Ci+1+ . . . =Σj≧i(ij)pi(1−p)j−1Cj. Therefore, the inverse of the matrix with entries (ij)pi(1−p)j−i, expresses each Cj as a linear combination of E(Oi)'s, and provides unbiased estimators [15, 9]. The entries of this inverted matrix are the FSD estimators αjL(p, i). The resulting estimators, however, are not well behaved [9]. Better estimators that use the TCP syn flag were proposed in [9].


Lε{SH, ASH} A similar derivation is used for adjusted FSD estimators for SH and ASH. These estimators can assume negative values, but are well behaved. Let Oi be the random variable representing the number of flows of count i, p is the sampling rate, and Ci be the number of flows of weight i.


Lemma 5.1. Ĉi=Oi/p−Oi+1(1−p)/p is an unbiased estimate of the number of flows of size i.


Proof The expectation of Oi is Cip+Ci+1(1−p)p+Ci+2(1−p)2p+ . . . =Σj≧iCj(1−p)j−ip


Therefore, the expectation of Oi/p−Oi+1(1−p)/p is Ci.


The respective nonzero coefficients are αjL(p, j)=1/p and αjL(p, j+1)=−(1−p)/p for j≧1.


The estimator for the total number of flows is O1/p+Σi>1Oi, which corresponds to the adjusted counts #ASH (p, 1)=1/p and #ASH(p, i)=1 for (i>1).


For ASH (proof provided in Section 9.6) tighter estimators are obtained. Let n(f) be the number of counted packets for flow f.








C
^

i

=

(

1
+




w


(
F
)


-

n


(
F
)



k



O
i


-




w


(
F
)


-

n


(
F
)



k




O

i
+
1


.








The respective nonzero FSD estimators are









α
j

A

SH




(

f
,

n


:


F

,

w


(
F
)



)


=



w


(
F
)


-

n


(
F
)


+
k

k


















if






n


(
f
)



=
j












and







α
j

A

SH




(

f
,

n


:


F

,

w


(
F
)



)



=

-



w


(
F
)


-

n


(
F
)



k














if






n


(
f
)



=

j
+
1.

















The





resulting





estimator





for





adjusted





count





is














#

A

SH




(
f
)


=



w


(
F
)


-

n


(
F
)


+
k

k













if






n


(
f
)



=

1





and





1






otherwise
.







SSH The SSH adjusted FSD estimators are more accurate (have smaller variance) than those obtained using SH and ASH sketches. Let Os, be the random variable representing the number of flows with observed count vector s.


Lemma 5.2. Let n be the observed count and p=(p1, . . . , pr) the corresponding sampling rate steps. Assume WLOG that nt>0 for 1≦l<r. The following are correct adjusted FSD estimators αiSSH(p, n) (i≧1). Only the nonzero values are stated.


If |n|−1, α1SSH(p, n)=1/pr. Otherwise,


If nr=|n|>1 (there is only one step and it is the last one) then α|n|SSH(p, n)=1/pr and α|n|−1SSH(p, n)=−(1−pr/pr.


For l=3, . . . , r−1, for l=2 if n1>1, and for l=nr>0:











α




h
=
l

r



n
h


sSH



(

p
,
n

)


=



-

c

l
,
l





q
sSH



[

n

n

]



.









If






n
1


=
1

,



α




l
=
2

r



n
h


sSH



(

p
,
n

)


=



-

(

1
-

p
2


)




q
sSH



[

n

n

]



.










If






n
1


>
1

,



α


-
1

+




h
=
1

r



n
h



sSH



(

p
,
n

)


=


-

(

1
-

p
1


)




q
sSH



[

n

n

]











α




h
=
1

r



n
h


sSH

=

1


q
sSH



[

n

n

]










The proof is deferred to Section 9.5. Using the relation #SSH(p, n)=Σi≧1αiSSH(p, n) and Eq. (3), the following adjusted counts are obtained:


Corollary 5.3.• If |n|=1, #SSH(p, n)=1/pr


If nr≧1 and |n|>1, #SSH(p, n)=1.


If nr=0, |n|>1, let l<r be the last step with a positive packet count.








#





sSH




(

p
,
n

)


=

1
+



c


l
+
1

,
r



q


[

n
|
n

]



.






(If all steps but the last have nonzero counts, then #SSH(p, n)=1+cr,r/q[n|n].)


Expressions for adjusted counts can be derived directly through the methods developed for adjusted weight derivation (see Section 9). As is the case for adjusted weights, there is a unique adjusted counts function #L(p, n). For Lε{NF, ANF}, using the unbiasedness constraints, it is obtained that the adjusted counts are the solution of the triangular system of linear equations: For a flow with count |f|










i
=
0



f






(





f






i



)





p
i



(

1
-
p

)





f


-
i




#
L



(

p
,
i

)



=
1.




Adjusted FSD estimators are computed based on the step-counts and therefore to facilitate FSD estimation, they need to be computed before the step-counts are discarded.


Hybrid algorithms The existing FSD estimators for NF sketches and ASH and SSH sketches are used as components.


For hybrid-ASH (or hybrid-SSH), the respective (ASH or SSH) estimators are applied to the counts obtained on the pbase-sampled stream. Unbiased estimates αj(j) (j>1) are obtained for the number of flows of size j in the subpopulation J in the pbase-sampled stream. These αj(J) values are then “treated” as observed counts with NF with sampling rate pbase, and are “plugged” in the NF FSD estimator. Unfortunately, since the NF estimators are ill behaved for low sampling rates, these estimators are ill behaved for low values Of pbase.


Lemma 5.4. The resulting estimates Ĉi1(i≧1) are unbiased estimates of the number of flows of size i in the original stream.


Proof The NF FSD estimators are derived by expressing Oj(j≧1), the expected number of flows with a certain observed counts as a linear combination of Ci(i>1), the number of flows of size i. The matrix is then inverted, and each Ci is expressed as a linear combination of the expectations of the observed counts. The estimators Ĉi are linear combinations of the observed counts. Since this is a linear combination, the observed counts can be replaced with any other random variables with the same expectation and unbiased estimators Ĉ′i are still obtained.


6 Estimating Other Aggregates


The sketches support estimators for aggregates of other numeric flow properties over a queried subpopulation. Flow-level and packet-level properties are distinguished.


6.1 Flow-Level Properties


A numeric property h(f) of the flow f is classified as flow level if it can be extracted from any packet of the flow and some external data (therefore, h(f) for all the flows that are included in the sketch is known). Examples are the number of hops to the destination AS, unity (flow count), and flow identifiers (source or destination IP address and port, protocol). Flow-level properties can be aggregated per-packet or per-flow.


Per-packet aggregation. For a subpopulation J⊂F, the per-packet sum of h( ) over J is ΣfεJw(f)h(f).


The per-packet average is











f

J





w


(
f
)




h


(
f
)








f

J




w


(
f
)




.




If h(f) is the number of AS hops traveled by the flow f then the per-packet sum is the total number of AS hops traveled by packets in the subpopulation J and the per-packet average is the average number of hops traveled by a packet in J. If h(f) is unity, the per packet sum is the weight of the subpopulation. It is not hard to see that for a sketch with unbiased adjusted weights, ΣfεJA(f)h(f) is an unbiased estimator of the per-packet sum of h( ) over J. (A (possibly biased) estimator for the per-packet average is












f

J





A


(
f
)




h


(
f
)








f

J




A


(
f
)




.

)




Per-flow aggregation. The per-flow sum of h( ) over J is ΣfεJh(f). The per-low average of h( ) over J is αfεJh(f)/|J|. If h(f)≡1, the per-flow sum is the number of distinct flows in a subpopulation. If h(f) is the number of AS hops then the per-flow average is the average “length” of a flow in J.


The generic estimator for per-flow sums is based on adjusted counts. For each fεF, E(#(f)h(f))=h(f), therefore










f

J




#


(
f
)



h


(
f
)




=




f


J

S





#


(
f
)



h


(
f
)








is an unbiased estimator of the per-flow sum of h( ) over J.


6.2 Packet-Level Properties


Packet-level properties have numeric h( )-values that are associated with each packet. For a flow f the h( )-value of f is defined as h(f)=Σcεfh(c). If h(c) is the number of bytes in the packet c then h(f) is the number of bytes in the flow. If h(c) is unity, then h(f)=w(f) is the number of packets of the flow, h(f) is available only if all packets of f are processed and therefore is not provided for flows included in NF and SH variants sketches.


The algorithms are adapted to collect information needed to facilitate unbiased estimators. For any desired packet-level property h( ), adjusted h( )-values HpL(f) are produced. For any f, H(f) is an unbiased estimator of h(f) and H(f)=0 for flows that are not included in the sketch. For any subpopulation J, ΣfεJH(f)=ΣfεJ∩SH(f) is an unbiased estimator for ΣfεJh(f).


Lε{NF, ANF}: Let N(f) be the set of counted packets and let n(f) be the packet count maintained by L for a cached flow f. To facilitate h( )-values estimation, the algorithm maintains the h( ) counts n(h)(f)=h(N). The adjusted h( )-value is HpL(f)=n(h)(f)/p. A subtle point is correctly updating n(h) for ANF when performing rate adaptation. The updated value should include the sum of the h( ) values of resampled packets which if strictly done, requires storage of the h( ) value of all packets in N(f), which is prohibitive. However, it is sufficient to store the total n(h)(f) and update it proportionally to the reduction in the packet count n(f). That is, if resampling reduces the packet count to n′(f), the h( )-count is updated n(h)(f)→n(h)(f)n′(f)/n(f).


The updated n(h)(f) is the expectation of the updated h( ) count that would have been obtained if N and per-packet h( ) values were explicitly maintained and sampled from N a subset of size n′(f). (All subsets of N(f) that are of the same size have the same probability of being in the resample, regardless of the packet position or its h( ) value.)


This consideration extends to a sequence of rate adaptations: The final n(h)(f) has the expectation of the h( ) count over all resamples that resulted in the same sequence of packet count reductions. Interestingly, done this way, a lower variance estimator is obtained than if per-packet h( ) values for N(f) had been maintained and used, as the h( ) count used is the expectation of the latter in each part of a partition of the sample space.


Lε{SH, ASH}: the unbiased estimator is obtained









H

A

SH




(
f
)


=



h


(


c
0



(
f
)


)





1
-
p

p


+

h


(

N


(
f
)


)




,
,




where N(f) is the set of counted packets of f and c0(f)εN(f) is the first counted packet off. To facilitate this estimator, the algorithm needs to record the h( ) value of the first packet and the sum of h( ) values of all subsequent packets. For ASH, the resampling makes a direct implementation infeasible, as per-packet h( ) values for all packets in N are required to be recorded. Averaging can not be used as for ANF, since later packets are more likely to be counted than earlier packets. Fortunately, there is efficient implementation for SSH.


Lε{SNF, SSH}: To facilitate estimators, the algorithms need to maintain per-step h( ) counts, h(N1), h(N2), . . . , h(Nr), where Ni is the set of packets counted in step i. For SSH, the h( ) value of the first packet c0 when the flow enters the cache is also needed to be maintained. The expressions for adjusted h( ) values are provided in Eq. (9) (for SSH) and Eq. (24) (for SNF).


Hybrid SH variants: Adjusted h( ) values for the sampled stream are obtained and scaled by pbase−1.


6.3 Sketches for Byte Counts


Byte counts can be estimated using a sketch built to estimate packet counts, but if byte counts are the main application, then SH variants can be adapted to estimate bytes directly instead of packets: The count values are applied to bytes and are captured as follows. If a packet belongs to a cached flow, the number of bytes is added to the active counter. Otherwise, the geometric distribution is used to determine what part of a packet (if at all) should be counted. For a continuous variant of this process, the exponential distribution can be used.


7. Implementation Design Using Discretized Sampling Rates


In one embodiment, the present invention provides an alternative to the pure models that addresses important practical implementation issues. The first is the number of rate adaptations performed. The second is the implementation of each rate adaptation, namely, the tracking of flow ranks that determines which flows are evicted and how counts are adjusted. It has been established that the discretized version preserves important properties of the pure model that allow for unbiased estimation and for other properties of the variance of the adjusted weights to carry over.


The discretized algorithm uses three tunable parameters that can be set by the router manufacturer. The first is pbase≦1 that determines the fraction of packets that are processed. The second is pstart≦pbase that determines the initial sampling rate. The third parameter is 0<μ<1 which controls the discretization of the sampling rates.


The number of rate-adaptations is a performance factor for all adaptive algorithms. Executing each adaptation is an intensive operation and therefore it is desirable to both limit the number of rate-adaptations and to carefully implement them [11]. For the step-counting algorithms, the number of rate adaptations also affects the size of intermediate storage and the computation of the adjusted weights (which depend on the number of rate-steps in which an actively-counted flow had a nonzero count).


The pure models perform a rate adaptation to evict a single cached flow at a time. It follows from the rank-based view that all adaptive algorithms (ANF, ASH, SNF, and SSH) perform the same rate adaptations. Rate adaptation occurs when the current sampling rate (the (k+1)st-smallest rank value of a flow) decreases. This happens when the cache is full (has k flows) and a sampled packet (equivalently, packet with rank value which is smaller than the current sampling rate) does not belong to a cached flow. The number of rate adaptations depends logarithmically on the size of the stream, but linearly on the size of the flow cache:


Lemma 7.1. Let m be the size of the packet stream. The expected number of rate adaptations is <(k+1) ln(pstartm).


Proof. The expected number of updates to the set of cached flows for aggregated data streams is analyzed in [4, 7]. This corresponds to a situation where each flow appears as a consecutive burst and is therefore a special case of the model. The argument used in [7] for uniform weights (a stream of 1-packet flows) trivially extends to a model where there is a stream of 1-packet flows where rank values of cached flows (flows included in the current sketch) can be arbitrarily decreased at arbitrary times.


An unaggregated stream of multi-packet flows in this model is expressed as follows: Packets are processed as if they belong to a stream of 1-packet flows. Once a flow is cached, the rank value(s) of subsequent packets that belong to the flow are examined and then these packets are deleted. If the rank of the deleted packet is smaller than the current rank of its flow, an arbitrary rank decrease is simulated and the rank of the flow is decreased to that of the packet. An important point for the analysis is that packet deletion is independent of the rank of the deleted packet. The probability that the ith undeleted packet modifies the sketch (has rank value that is smaller than the (k+1)st smallest rank) is at most min{1, (k+1)/i}. The total number of undeleted packets is at most m. Therefore, the expected number of updates is at most










i
=
1

m



min


{

1
,


(

k
+
1

)

i


}






(

k
+
1

)


ln






m
.






This bound is nearly tight for streams that consist of 1-packet flows [7], and it is Ω(k ln(pstartm)) (asymptotically tight) when at least a constant fraction of packets belong to small flows. Large number of small flows is common in Zipf-like data and small flows are often introduced in DDoS attacks, port or IP address scanning, and other anomalies.


The actions of a run of a discretized variant of ANF, ASH, SNF, SSH, and hybrids, are equivalent to those of the original variant except that when the flow cache overflows (there are more than k flows with current rank value that is below the current sampling rate), the sampling rate is decreased by a factor of μ until at least one flow (but in expectation at most (1−μ) fraction of the flows) are evicted. Observe that the discretized implementation does not always produce sketches with k flows: The number of flows is at most k but can be smaller even if there are k or more distinct flows in the pbase-sampled stream.


A discretized rank-based view of the discretized sketching algorithms is provided. This view is equivalent to replacing sampling rates and rank values of packets and flows xε[0, 1] with [logμ(x/pbase)]. (Smaller values have larger discretized value.) Packets of the pbase-sampled stream are assigned discretized ranks using a geometric distribution with parameter (1−μ). The discretized rank of a flow is the largest rank of a packet of the flow. The discretized current sampling rate is initially set to [logμ(pstart/pbase)]. After k distinct flows are cached, it is the (k+1)st largest discretized rank of a flow, which is equal to the largest discretized rank of a cached flow plus 1. The discretized effective sampling rate is the discretized sampling rate at the end of the measurement period. The flow counts collected over the pbase-sampled stream correspond to those for the pure model: A packet is included in the current discretized ANF count if and only if its discretized rank value is above the discretized current sampling rate. With discretized ASH, the packet is included if and only if the discretized rank of the flow after the packet is processed is above the discretized current sampling rate, and similarly for SNF and SSH.


The following property, that holds for the pure model, extends to the discretized model:


Lemma 7.2. A flow f is cached in the discretized model if and only if its discretized rank is larger than the kth largest discretized rank of the flows in F\{f}. (If there are fewer than flows in F\{f} with positive discretized rank value, the flow is cached if and only if its rank is positive.)


This property is critical for extending the analysis of unbiased estimators and variance relations to the discretized model. It allows to simply “plug in” sampling rates and the respective flow counts into the unbiased estimators developed for the pure model. The subtle arguments do not carry over to other conceivable implementations of rate adaptations such as removing a constant fraction of (highest-ranked) cached flows [16, 11] without having to maintain additional state.


A side benefit of discretization is that fewer bits are needed to encode rank values of active flows, as the expected maximum discretized rank of a flow is logμ(mpbase). Other advantages of such discretization, such as layered transmission of summaries, are provided in [11].


The number of rate adaptations is tuned using the parameters μ and pstart. Larger values of μ correspond to a higher number of rate adaptations but also to better memory utilization and more flows in the final sketch (the expected number of active counters and number of flows in the final sketch is about k (1+μ)/2). Lower values of pstart eliminate up to [logμ(pstart/pbase)] rate adaptations. The counts of the step-counting algorithms are reduced by lower pstart, but if pstart is larger than the effective sampling rate, then the sketch produced by ANF and ASH are not affected by the lower pstart. The discretized implementation has a considerably better bound on the number of rate adaptations than the pure model. In particular, the linear dependence on k exhibited by the bound obtained for the pure version, is eliminated.


Lemma 7.3. The expected number of rate adaptations performed is at most logμ(pstart*m).


An implementation of the discretized algorithms is outlined. The execution is divided into counting phases and rate adaptations (a design of [11] allows them to run concurrently).


Counting phase. Each counting phase starts with a set of statistics counters indexed by the flow attributes of cached flows and applied to the pbase-sampled packet stream. Each packet is labeled as “sampled” (again) with probability μt, where t is the current discretized sampling rate. The following is performed: (i) If the flow is cached then: If the algorithm is one of ASH, SSH, and hybrids or the packet is labeled sampled and the algorithm is one of ANF and SNF, the respective flow counter is incremented. (With SH variants and hybrids, the packet is sampled only if the flow is not cached.) (ii) If the packet is labeled sampled and the flow is not cached, a new entry in the flow cache is created. If there are k cached flows, a rate adaptation is performed.


Rate adaptation. The adaptive algorithms, ANF, ASH, and hybrid-ASH maintain a single packet count for each cached flow. These counts are updated during the rate adaptation until at least one flow has a zero count. For ANF, the updated count is a binomial random variable with parameters μ and the current count; for ASH, with probability μ the count remains unchanged and otherwise it is a geometric random variable with parameters that are the current count minus 1 and rate μt+1, where t is the current discretized sampling rate. After the counts of all cached flows are updated, the current discretized sampling rate is incremented.


The update process is repeated until at least one flow has a count of zero. (The repeated process can be avoided by storing discretized rank values for each flow as proposed next for the step-counting algorithms.) All flows with a count of zero are then evicted from the cache.


The step-counting algorithms SNF, SSH, and hybrid-SSH store a discretized rank for each cached flow. The flow ranks are updated using the counts collected in the most recent counting phase. The set of cached flows with smallest discretized rank value are then evicted. The discretized sampling rate is updated to be the discretized rank of evicted flows.


The update process of the rank of cached flows emulates the following process that assigns ranks individually to packets counted in the recent counting step. The first packet counted (SH and hybrid variants with flow that was not cached at the beginning of the phase) and all packets counted (NF variants) obtain a random rank from a geometric distribution with parameter (1−μ), conditioned on it being larger than the current discretized sampling rate. The rank of each flow is updated to be the maximum of its current rank and the ranks assigned to the packets of the flow counted at the recent counting phase.


These updates can be performed efficiently (computation steps proportional to the number of cached flows with non-empty counts at the recent step) using the exponential distribution to find the maximum discretized rank over a set of packets.


7.1 Adjusted Weights for Discretized Algorithms


Unbiased adjusted weights for the discretized algorithms are obtained by recording the discretized sampling rates for each step. Each discretized rate t is then converted to a corresponding sampling rate (pstart/pbaset and plugged in the corresponding expressions for ANF, ASH, SNF, or SSH adjusted weights. For the hybrid versions (pbase<1), the adjusted weights are scaled by pbase−1.


The arguments for correctness, that are based on obtaining an unbiased estimator on each part in a partition of the same space, extend to the discretized version using Lemma 7.2. If the ranks of all packets in F\{f} are fixed, the discretized sampling rate when f is counted depends only on these fixed ranks (and not on ranks assigned to previous packets of f) and is equal to the sampling rate at measurement time.


Therefore, unbiased adjusted weights can be computed while treating the effective sampling rate (for ASH and ANF) or the steps of the current sampling rate (for SNF and SSH) as being fixed.


The proofs of other properties, such as the relation between the algorithms (Section 4.4), the variance relation (Theorem 4.13), and the zero covariances (Lemma 4.11) extend to the discretized variants.


8 Simulations


Simulations are used in order to understand several performance parameters: The accuracy of the estimates derived and its dependence on the algorithms, parameter settings, and the consistency of the subpopulation, the tradeoffs of the hybrid approach, and the effectiveness of the parameters controlling the number of rate adaptations. The simulations were performed using the discretized variants of the algorithms, with parameters k (maximum number of counters), 0<pbase≦1 that determines the fraction of processed packets (hybrid approach), and μ and pstart, that control a tradeoff between accuracy/utilization and the number of rate adaptations.


8.1 Data


Both synthetic and IP flows datasets were used. The IP flows data were collected using unsampled NetFlow (flow-level summary of each 10 minute time period that includes a complete packet count for each flow) deployed at a gateway router. A typical period has about 5000 distinct flows and 100K packets. The synthetic datasets were produced using Pareto distributions with parameters α=1.1 and α=1.5. Distributions of flow sizes were generated by drawing 5000 flow sizes. A packet stream was simulated from each distribution of flow sizes by randomly permuting the packets of all flows.


The cumulative distributions of the weight of the top i flow sizes for each distribution is provided in FIG. 2.


The subsets (subpopulations) considered for the synthetic datasets were the 2i largest flows and the 50%, 30%, and 10% smallest flows. This selection enables understanding of how performance depends on the consistency of the subpopulation (many smaller flows or fewer larger flows) and the skew of the data. The subpopulations used for the IP flows (gateway) data were a partition of the flows according to destination port.


8.2 Quality of Sketches


The accuracy of subpopulation-size estimates obtained using ANF, SNF, ASH, and SSH were compared. Performance as a function of the size k of the sketch (and the size of the flow cache) was evaluated. Also included was weighted sampling without replacement.


Results that show the average absolute value of the relative error as a function of the cache size k are provided in FIGS. 3 and 4. The averaging for each data point was performed over 200 runs. The figures reflect the relation established theoretically: SSH dominating ASH which in turn dominates ANF and that SNF dominates ANF. They also show that ASH dominates SNF on the data. For subpopulations consisting of large flows, such as top-i flows and applications with medium to large flows, the performance gaps are more pronounced. This is because on these flows, the more dominant methods count more packets and obtain adjusted weights with smaller variance. The adjusted weight assignments have minimum variance with respect to the information they use (the counts collected for the flow). This “optimality” enables translation of the larger counts to smaller errors.


On subpopulations of very small flows, such as bottom-50% of flows or DNS (port 53) traffic (only the latter is shown), all methods have similar performance. In particular, there is no advantage for Ws (the strongest method) over ANF (the weakest) on subpopulations consisting of 1-packet flows.


The results strongly support the use of step-counting as an alternative to the adaptive variants: On subpopulations consisting of many medium to large size flows, the relative error obtained using SNF and SSH is significantly smaller than what is obtained using ANF or ASH, respectively.


8.3 Evaluation of the Hybrid Algorithms


The parameter pbase is decreased while maintaining the same flow cache size k=400. FIG. 5 shows that the estimate quality gracefully degrades and a smooth performance curve is obtained. Even for pbase=0.1, the hybrid-ASH and hybrid-SSH outperform ANF and SNF, respectively.



FIG. 6 shows the number of packets counted as a function of pbase as a fraction of the number of packets in the pbase-sampled stream and as a fraction of the total number of packets. The hybrids provide a desirable smooth tradeoff that provides high counting rate of processed packets, while enabling to fully control the fraction of total packets that are processed.


8.4 Controlling the Number of Rate Adaptations


The parameter μ, which controls the rate of decrease of the sampling rate, is sweeped and through it, the total number of rate adaptations performed. It is expected that the (absolute value of the) relative error of the estimates to increase when μ is decreased, as fewer packets are counted and reflected in the final sketch. On the other hand, the number of rate adaptations performed and the size of intermediate temporary storage needed to store the count vectors for SNF and SSH should decrease with μ. The effectiveness of the parameter μ and the feasibility of a router implementation depends on this tradeoff.



FIG. 7 shows the dependence of the average absolute value of the relative error on the parameter μ. It can be seen that there is minimal performance loss in terms of estimate quality when μ is reduced from 0.9 to 0.5.



FIG. 8 shows that selecting a smaller μ=0.5 is very effective. Firstly, the number of rate adaptations is much smaller, and secondly, the size of intermediate temporary storage needed for collecting the count vectors, is much smaller with, μ=0.5 than with μ=0.9.


9. Deferred Proofs


The adjusted weights assigned are a function of the observed count of the flow and the sampling rate. The sampling rate (effective sampling rate or sampling rate steps) in the adaptive algorithms is treated as fixed because for any flow f it is determined by the sampling performed on all “other” flows (F\{f}). Therefore, within the probability subspace where the sampling on all other flows is fixed, the sampling rate is fixed. The adjusted weight of each flow is unbiased within each such subspace.


Three different techniques to derive adjusted weights are deployed. These techniques are general tools applicable to other quantities such as adjusted counts, unbiased FSD estimators, and adjusted selectivities.


System of equations: The unbiasedness constraints correspond to linear equations over the variables ApL(n). For a flow f, the expected adjusted weight over all possible observable counts n≦f of f must be equal to w(f): w(f)=Σn≦fq[n|f]ApL(n), where q[n|f] is the conditional probability that L obtains a count of n for a flow f. The system of equations can be used to derive expressions for the adjusted weights, be solved numerically to compute adjusted weights for each instance, or establish properties of the solution such as uniqueness. (A unique solution to this system implies that there is a unique deterministic assignment of adjusted weights that is a function of the observed counts of the flow and the sampling rate).


Dominance: Algorithm A1 dominates A2 if A1 counts are “more informative,” that is, each possible set of A1 counts corresponds to a probability distribution over sets of A2 counts such that applying A1 and drawing an A2 count from the corresponding distribution is equivalent to applying A2. For example, SSH dominates ASH and ASH dominates ANF. Adjusted weights for A1 can be derived from those of A2 by taking the expectation of A2 adjusted weights over the distribution that corresponds to the A1 counts. If there is no closed form for A1 adjusted weights, one can draw multiple times from the corresponding distribution and take an average of the A2 adjusted weights. The resulting per-item adjusted weights of A1 are unbiased and have equal or lower variance than A2 adjusted weights (same arguments as for mimicked sketches [7]). Dominance implies that if an algorithm has unique deterministic adjusted weights, the per-item variance of these adjusted weights is at most that of any algorithm that it dominates.


Per-packet Horvitz-Thompson (HT) analysis. The HT estimator is applicable when both the weight and the sampling probability of each item are provided. The weight is available for packets, but in the unaggregated setting, not for flows, and therefore an adjusted weight is computed for each packet. The adjusted weight of the flow is then the sum of the adjusted weights of packets of the flow. The second ingredient needed for HT estimators is the sampling probability, which can not be determined from the sketch. HT is applied with sample space partitioning [5] to “bypass” knowledge of the sampling probability. Per-packet analysis allows to derive unbiased estimators for other packet-level properties.


9.1 Adjusted Weights for SSH


All three methods are demonstrated by applying them to derive SSH adjusted weights (proof of Theorem 4.8).


System of equations: Any valid observed count i of a flow with n packets has the form (0, 0, ij, nj+1, . . . , nr), where 1≦ij<nj. Vectors of this form are referred to as suffixes of the vector n=(n1, . . . nr). The notation SUFFn (j, ij) is used for the suffix (0, . . . , 0, ij, nj+1, . . . , nr) of n (subscript is omitted when clear from context). The total order is utilized over the suffixes SUFFn (i, ij) defined by the lexicographic order on the vectors SUFFn (i, ij) with their coordinates reversed. That is,






SUFF(r,1)=(0, . . . , 0,1)<SUFF(r,2)=(0, . . . , 0,2)< . . . <SUFF(r,nr)=0, . . . , 0,nr<SUFF(r−1,1)=(0, . . . , 0,1,nr)< . . . <SUFF(1,n1)=(n1, . . . , nr)


A correct adjusted weight assignment must satisfy for any vector n=(n1, . . . , nr),













s

n





q


[

s
|
n

]





A
sSH



(
s
)




=




j
=
1

r




n
j

.






(

Eq
.




7

)







(For a flow with counts (n1, . . . , nr), the expectation of the adjusted weight should be equal to the size Σj−1rnj of the flow.)


To compute ASSH(n), a system of equations is obtained using an instance of Eq. (7) for each suffix x≦n of the observed count. The system of equations includes the variables ASSH(x) for all x≦n and the coefficients q[s|x] for all s≦x. The matrix is triangular and can be solved by substitutions. Computation of adjusted weights that directly utilizes the system of equalities requires a number of operations is the product of the number of nonzero coordinates of n and (Σh=1rni)2 (the square of the number of observed packets). (The time to solve the equations is proportional to (Σh−1rni)2, but having (Σh−1rni)2 coefficients, it takes time proportional to the number of nonzero coordinates of n to compute each one.) This quadratic dependence in the number of packets makes the computation very intensive for large flows. The equations are parametrically solved to derive expressions for the adjusted weights.


Lemma 9.1. Let SUFFn(j,ij)≦SUFFn(k,ik)≦n. The following equality holds:






q[SUFF
n(j,ij)|n]=(1−pj)(nk−ik)+Σh=1k−1nhq[SUFFn(j,ij)|SUFFn(k,ik)].


Proof











q


[

n
|
n

]





A
sSH



(
n
)



=





h
=
1

r



n
h


-




s

n





q


[

s
|
n

]






A
sSH



(
s
)


.








From






Eq
.





(
7
)









Lemma 9.1 is applied to express the sum Σs<nq[s|n]ASSH(s) as a sum of sums of the form of the lhs of Eq. (7) for the vectors SUFFn(1, n1−1) and SUFFn(k, nk) (for k=2, . . . r). Then the respective rhs is substituted.










s

n





q


[

s
|
n

]





A
sSH



(
s
)




=





(

1
-

p
1


)







s


SUFF


(

1
,


n
1

-
1


)










SUFF


(

2
,

n
2


)



s






q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)





+


(

1
-

p
2


)







s


SUFF


(

2
,

n
2


)










SUFF


(

3
,

n
3


)



s






q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)





+












(

1
-

p
i


)







s


SUFF


(

i
,

n
i


)










SUFF


(


i
+
1

,

n

i
+
1



)



s






q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)





+





+


(

1
-

p
r


)






s


SUFF


(

r
,

n
r


)







q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)






==



c

1
,
1







s


SUFF


(

1
,


n
1

-
1


)







q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)





+




h
=
2


r
-
1





(


c

1
,
h


-

c

1
,
1



)







s


SUFF


(

h
,

n
h


)










SUFF


(


h
+
1

,

n

h
+
1



)



s






q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)






+


(


c

1
,
r


-

c

1
,
1



)






s


SUFF


(

r
,

n
r


)







q


[

s
|

SUFF


(

1
,


n
1

-
1


)



]





A
sSH



(
s
)







=




c

1
,
1


(









h
=
1

r



n
h


-
1

)

+




h
=
2


r
-
1





(


c

1
,
h


-

c

1
,
1



)




(

1
-

p
h


)



n
1

-
1








s


SUFF


(

h
,

n
h


)










SUFF


(


h
+
1

,

n

h
+
1



)



s






q
[





s
|





SUFF


(

2
,

n
2


)



]




A
sSH



(
s
)






+


(


c

1
,
r


-

c

1
,
1



)




(

1
-

p
r


)



n
1

-
1











s


SUFF


(

r
,

n
r


)







q
[





s
|

SUFF


(

2
,

n
2


)



]




A
sSH



(
s
)






=




c

1
,
1


(





h
=
1

r



n
h


-
1

)

+




h
=
2


r
-
1





c

2
,
h








SUFF


(


h
+
1

,

n

h
+
1



)



s


SUFF


(

h
,

n
h


)







q
[





s
|





SUFF


(

2
,

n
2


)



]




A
sSH



(
s
)






+


c

2
,
r











s


SUFF


(

r
,

n
r


)







q


[

s
|

SUFF
(





2
,





n
2


)


]





A
sSH



(
s
)






=




c

1
,
1


(





h
=
1

r



n
h


-




1

)

+


c

2
,
2







s


SUFF


(

h
,

n
h


)







q


[

s
|

SUFF


(





2
,





n
2


)



]





A
sSH



(
s
)





+




h
=
3


r
-
1





(


c

2
,
h


-

c

2
,
2



)







SUFF


(


h
+
1

,

n

h
+
1



)



s


SUFF


(

h
,

n
h


)







q
[





s
|





SUFF
(





2
,





n
2






)






]







A
sSH







(




s




)









+


(


c

2
,
r


-

c

2
,
2



)






s


SUFF


(

r
,

n
r


)







q
[





s
|

SUFF


(

2
,

n
2


)



]




A
sSH

(




s
)





=



c

1
,
1


(









h
=
1

r



n
h


-




1

)

+






c

2
,
2











h
=
2

r



n
h







+




h
=
3


r
-
1





(


c

2
,
h


-





c

2
,
2



)













(

1
-

p
h


)


n
2












s


SUFF

(

h
,





n


h



)










SUFF


(


h
+
1

,

n

h
+
1



)



s





q




[







s




|







SUFF




(





3




,





n
3






)











]




A
sSH



(
s
)



+


(


c

2
,
r


-

c

2
,
2



)




(

1
-

p
r


)


n
2











s


SUFF


(

r
,

n
r


)







q


[

s
|

SUFF


(

3
,

n
3


)



]





A
sSH



(
s
)







=




c

1
,
1


(





h
=
1

r



n
h


-
1

)

+


c

2
,
2







h
=
2

r



n
h



+




h
=
3


r
-
1





c

3
,
h












SUFF


(


h
+
1

,

n

h
+
1



)



s


SUFF


(

h
,

n
h


)







q
[





s
|





SUFF






(





3




,





n
3






)







]




A
sSH

(




s
)





+






c

3
,
r











s


SUFF


(

r
,

n
r


)







q
[





s
|





SUFF
(





3
,





n
3






)






]




A
sSH



(
s
)






=


=



c

1
,
1


(









h
=
1

r



n
h


-
1

)

+




j
=
2

r




(


c

j
,
j







h
=
j

r



n
h



)

.




Therefore






,







q


[

n
|
n

]





A
sSH



(
n
)



=






h
=
1

r



n
h


-


c

1
,
1


(


-
1

+




h
=
1

r



n
h



)

-




j
=
2

r




c

j
,
j







h
=
j

r





n
h

.




By






rearranging





it





is





obtained





that






q


[

n
|
n

]





A
sSH



(
n
)







=


c

1
,
1


+




i
=
1

r





n
i

(

1
-




h
=
1

i



c

h
,
h




)

.



















The proof follows using Eq. (3).


Derivation based on per-packet HT estimator. Let h be a per-packet weight function and let h(f)=Σcεfh(c) be the h( )-value of f. (h(c)≡w(c)=1 for packet counts but other packet-level properties can also be used such as the number of bytes in c.) Unbiased adjusted h( ) values HSSH(c) are computed for each packet from which unbiased adjusted h( ) values can be obtained for each flow using


HSSH(f)=ΣcεfHSSH(c). By definition, packets that are not counted have adjusted h( )-values zero.


The HT estimator of h(c) is the ratio of h(c) and the probability that the packet c is counted in the sketch. It is clearly unbiased. This probability, however, can not be computed from the sketch. A partition of the sample space is used such that within each subspace in the partition there is a positive probability that the packet is sampled and this conditional probability can be determined from the sketch. The adjusted h( ) value for each packet is an application of the HT estimator within this subspace.


The adjusted h( ) value HSSH(c) of a counted packet c of a flow f is considered. The sample space is partitioned such that all rank assignments in the same subspace of the partition share the following.


1. The rank values of packets in F\{f}.


2. The number of packets off that are counted continuously up to and not including c. (Note that this could be 0.)


Note that the subspace that the rank assignment is mapped to also includes rank assignments where f does not appear in the sketch at all or that f appears but c is not counted. This happens if the current sampling rate drops below the current rank of the flow right before or after c is processed.


The conditional probability is computed that c is counted assuming that the rank assignment belongs to the particular subspace that it maps to. Since the ranks of packets of flows in F\{f} are fixed in this subspace then so are the steps, p, of the kth smallest rank of a flow in F\{f}. Furthermore, in any rank assignment in the given partition where packet c is counted, the same number of packets in each step are counted. Let n be the vectors of counts obtained for f in any rank assignment where c is counted. (In rank assignments in the same subspace where c is not counted this vector could be different.)


HSSH(c) is computed according to one of the following cases.


1. Packet c is one of the ni packets counted in step i for some i>1. In this case the conditional probability that c is counted is











q


[

n
|
n

]



1
-




h
=
1

i



c

h
,
h





.




(

Eq
.




8

)







To see this, fix the ranks of packets of F\{f}. Then (1 −Σh=1ich,h) is the probability that all n1+ . . . +ni up to and including the packets of step i are counted. q[n|n] is the probability that all n packets are counted. Therefore, Eq. (8) is the conditional probability that n is counted given that all packets up to c are counted.








H
sSH



(
c
)


=


h


(
c
)






1
-




h
=
1

i



c

h
,
h





q


[

n
|
n

]



.






It follows that


2. Suppose c is the first packet among the n1 packets of step 1. In this case, the conditional probability that c is counted is q[n|n], and HSSH(c)=h(c)/q[n|n].


3. Suppose that c is a packet of step 1 other than the first. Fixing the ranks of packets of flows in F\{f} the packets of step 1 with probability p1 are

    • counted: That is the probability that the first packet in step 1 is counted. So the conditional probability that c is counted is q[n|n]/p1 and HSSH(c)=h(c)p1/q[n|n].


Let Ni be the set of packets counted in step i, and let c0 be the first counted packet.














H
sSH



(
f
)


=






c

f





H
sSH



(
f
)









=






j

1







c


N
i






H
sSH



(
c
)










=





h


(

c
0

)


+


(


h


(

N
1

)


-

h


(

c
0

)



)



(

1
-

c

1
,
1



)


+




i
=
2

r




h


(

N
i

)




(

1
-




h
=
1

i



c

h
,
h




)





q
[

n
|
n

)








=







h


(

c
0

)




c

1
,
1



+




i
=
1

r




h


(

N
i

)




(

1
-




h
=
1

i



c

h
,
h




)





q
[

n
|
n

)


.








(

Eq
.




9

)







To facilitate this estimator, the algorithm needs to collect per-step sums h(Ni) over counted packets in the step and to separately record h(c0).


Derivation Based on Dominance of SSH Over ASH


Proof. Computed is the expectation of the adjusted weight of ASH when considered nonzero only on rank assignments such that SSH fully counts the flow. This expectation is referred to as the combined expectation. The conditional expectation sought is then the ratio of the combined expectation and qSSH[n|n]. Therefore, it is needed to be shown that the combined expectation is equal to





qSSH[n|n]ASSH(n).


Suppose now that |n|>nr. If the SSH count is n, the ASH count on the same rank assignment must start in a packet that occurred before the last step (for SSH to fully count the flow the rank must be at most pr, before the beginning of the step), and therefore step r has contribution zero to the combined expectation. For each step r−1>l>1, the “contribution” to the combined expectation if ASH started counting the flow during step l is computed. The probability that at the beginning of the step the rank value was at least pr is (cl,r−cl,l). Conditioned on that, the contribution to the expectation is













t
=
0



n
l

-
1






(

1
-

p
r


)

t




p
r

(





h
=
l

r



n
h


+


(

1
-

p
r


)



p
r

-
t



)



=





h
=
l

r



n
h


-



(

1
-

p
r


)


n
l







h
=

l
+
1


r




n
h

.








(

Eq
.




10

)







Therefore, the contribution is the product











(


c

l
,
r


-

c

l
,
l



)



(








h
=
l

r



n
h


-








(

1
-

p
r


)


n
l







h
=

l
+
1


r



n
h






)


=



(


c

l
,
r


-

c

l
,
l



)






h
=
l

r



n
h



-


c


l
+
1

,
r







h
=

l
+
1


r




n
h

.








(

Eq
.




11

)







First considered is the case where |n|=nr (all observed packets are in the last step). In this case, if the SSH count is n, the ASH count must be |n| and ASSH (n)≡AASH(|n|). The combined expectation is therefore qSSH[n|n]AASH(|n|)=qSSH[n|n]ASSH(n).


One needs to be slightly careful with the first step by considering the rank of the first packet and then the other n1−1 packets. With probability pr, the first packet obtains rank value at most Pr and ASH uses the adjusted weight Σh=1rnh+(1−pr)/pr and therefore the contribution is the product










(

1
-

p
r


)

+


p
r






h
=
1

r




n
h

.







(

Eq
.




12

)







With probability p1−Pr≡c1,r−c1,1, the first packet obtains rank value in (pr, p1], and applying a similar derivation as Eq. 10 for the remaining n1−1 packets, it is obtained −1+Σh=1rnh−(1−pr)n1−1Σh=2rnh.


The contribution is therefore,










p
r

-

p
1

+


(


c

1
,
r


-

c

1
,
1



)






h
=
1

r



n
h



-


c

2
,
r







h
=
2

r




n
h

.







(

Eq
.




13

)







Summing the contributions of all the steps in Eq. 11, Eq. 12, and Eq. 13, it is obtained that this expectation is











(

Using





Theorem





4.8





and






Eq
.




3.


)









(

1
-

p
r


)

+


p
r






h
=
1

r



n
h



+

p
r

-

p
1

+


(


c

1
,
r


-

c

1
,
1



)






h
=
1

r



n
h



-


c

2
,
r







h
=
2

r



n
h



+




l
=
2


r
-
1




(






(


c

l
,
r


-

c

l
,
l



)






h
=
l

r



n
h



-







c


l
+
1

,
r







h
=

l
+
1


r



n
h






)



=




p
1



n
1


+

(

1
-

p
1


)

+




l
=
2

r




(

1
-




h
=
1

l



c

h
,
h




)



n
l




=



q
sSH



[

n
|
n

]






A
sSH



(
n
)


.







Lemma 9.2. Consider a flow with SSH counts n. The conditional expectation of the adjusted weight assigned to the flow by ASH, given that the flow is fully counted by SSH, is equal to ASSH(n) (the adjusted weight assigned by SSH for observed count n).


9.2 Variance Relation


Consider a flow f with |f| packets and the probability subspace where ranks of packets belonging to all other flows (F\{f}) are fixed. It is sufficient to establish the relation between the methods in this subspace. Consider such a subspace. Let p be the steps of the effective sampling rate and pr be the final effective sampling rate. The adjusted weight assignment for all methods has expectation |f| within each such subspace. The variance of the different methods within such subspace is considered and the notation VAR (AL(f)|P) is used for Lε{SSH,SNF}, and VAR(AL(f)|pr) for Lε{ws,ANF,ASH}. This conditioning is equivalent to establishing the variance relation when the sampling rate pr is fixed or when the steps p are fixed (and the last step is pr). It is the key for extending the proofs to the discretized version, since it is simply conditioned on a different step function p determined by the discretized (k+1)th largest rank. It also shows that the variance relation holds for the fixed-rate and fixed-steps variants of ws NF and SH.


The variance for ANF is that of a binomial random variable and therefore is






VAR(AANF(f)|pr)=|f|(1−pr)/pr.  (Eq. 14)


For Ws, the adjusted weight is |f|/(1−(1−pr)|f|) with probability 1−(1−pr)|f| and zero otherwise, and therefore, the variance is






VAR(AWS(f)|pr)=|f|2(1/(1−(1−pr)−1).  (Eq. 15)


For ASH, it is













VAR


(



A

A

SH




(
f
)


|

p
r


)


=







i
=
0




f


-
1






(

1
-

p
r


)

i





p
r



(



f


-
i
+


(

1
-

p
r


)

/

p
r



)


2



-



f


2








=




(


(

1
-

p
r


)

-


(

1
-

p
r


)




f


+
1



)

/


p
r
2

.









(

Eq
.




16

)







For SSH and for SNF, the variance VAR(ASNF(f)|p) depends on the way the packets of the flow f are distributed across these steps. The variance is lowest when all packets occur when the sampling probability is highest, and the variance is highest, and equal to that of ANF, when all packets occur on the step with the lowest sampling probability. The variance relation is established using the following Lemma.


Using the explicit expressions (Eq. 14, 15, 16) and the inequality (1−p)n≧1−np for all natural n and 0≦p≦1 it follows that






VAR(AWS(f)|pr)<VAR(AASH(f)|pr)<VAR(AANF(f)|pr)


The relation between the variance of the different methods is established via direct arguments that provide more insights and are applicable to the step-counting algorithms.


Lemma 9.3. Consider two mappings A1 and A2 and suppose there exists a partition of the sample space S into subspaces such that within each subspace S′⊂S,


μS′(A1)=μS′(A2) (that is, A1 and A2 have the same expectation on the subspace S′), and


μS′2(A1)≧μS′2(A2) (the variance, or alternatively, the second raw moment, of A1 is at least as large as A2).


Then μS(A1)=μS(A2) and μS2(A1)≧μS2 (A2) (A1 and A2 have the same expectation and the variance of A1 is at least as large as A2.)


Corollary 9.4. Let A1 be an estimator and consider a partition of the sample space. Consider the estimator A′1, that has a value that is equal to the expectation of A1 on the respective part of the partition. Then






E(A1)=E(A′1) and VAR(A1)≧VAR(A′1).


If f is not included in the sample (r(f)>pr), it obtains an adjusted weight of zero with all four methods. Therefore, it suffices to compare the methods based on the variance in the adjusted weight assignment within the probability subspace when the flow is sampled (r(f)≦pr). Since all methods are unbiased, they all have the same expectation on this subspace. Apply Lemma 9.3. With ws, f obtains an adjusted weight of f|/(1−(1−pr)|f|), which is fixed, therefore the variance is zero. Therefore, this assignment is optimal among all methods that yield the same probability distributions over subsets of flows. In particular,






VAR(AWS(f)|pr)≦VAR(ASSH(f)|p).


Next ANF and ASH are compared. The probability subspace is further partitioned by fixing the position iε[1, . . . , |f|] of the first packet in f that obtains rank that is at most pr. The adjusted weight assigned by ASH is (a fixed value) of (1/pr)+(|f|−i), and therefore the variance is zero. ANF assignment is (1/pr) plus (1/pr) times a binomial random variable with parameters (|f|−i) and pr. This assignment has the same conditional expectation as the ASH assignment within this subspace, but also has a nonnegative, and therefore at least as large, variance (the variance is strictly positive when i<|f|). Therefore, using Lemma 9.3, ASH has a smaller variance overall than ANF.


The variance of SSH and ASH is compared by again applying Lemma 9.3. (Since SSH does not have the same expectation as ASH on each such subspace, the same partition that was used for comparing ASH and ANF cannot be used here.) The sample space is partitioned according to the suffix of the packets of f that are counted using SSH. That is, each subspace contains all rank assignments to packets of f that result in this suffix being counted. The adjusted weight assigned by SSH is fixed within each partition and therefore has zero variance. The ASH adjusted weight depends on the first packet that obtains rank value below pr, and therefore varies. (The variance can be zero only if all suffix packets are contained in the last step. In this case, the first packet of the suffix has rank value below pr and therefore all suffix packets are counted by ASH.) What remains to show is that ASH and SSH adjusted weights have the same expectation within each such subspace.


The following simple observation is applied. Consider a flow with counts n and a vector s≦n. The conditional probability that i packets are counted using ASH given that s is counted using SSH is independent of the choice of n (depends only on s). Therefore, the expectation of the adjusted weight assigned by ASH conditioned on SSH counting s out of n is equal to the expectation when SSH counts s out of s. This simplifies the proof, as it suffices to establish equality for flows that are fully counted by SSH, which is established in Lemma 9.2.


Lemma 9.5. VAR(ASSH(f)|p)≦VAR(ASNF(f)|p)


Proof. Consider a flow f and a probability space Ω(p) containing all rank assignments such that the steps (as defined by the kth smallest rank in F\J) are p. Consider a partition of Ω to subspaces Ωn(p) according to the SSH count vector n obtained for f.


Consider one such subspace Ωn(p). By definition, the adjusted weight assigned to the flow f in this subspace is fixed and is equal to APSSH(n).


Another SSH adjusted weight assignment is defined, A′pSSH (n) as the expectation of the estimator ApSNF over rank assignments in Ωn(p).


For any rank assignment, a packet is counted by SNF only if it is counted by SSH. The first counted packet by SSH, must also be counted by SNF. Therefore, s is a possible SNF count off in Ωn(p) if and only if it has the form s≦n (component wise) and s1>0 (assume WLOG that n1>0). For notation convenience, the vectors n′=(1, n1−1, n2, . . . nr.), s′=(1, s1−1, s2, . . . sr) and p′=(p1, p1, p2, . . . pr) are defined. (That is, a “dummy” step with probability p1 is created, that precedes the first step and contains the first packet of n.) This notation allows to specify that the first “packet” of n is counted.


The probability over Ωn(p) of a rank assignment with corresponding SNF count s is equal to





qp′SNF[s′|n′]/qpSSH[n|n].


Therefore,











A
p







sSH




(
n
)


=





s

n

|


s
1

>
0








q

p


sNF



[


s


|

n



]




q
sSH



p


[

n
|
n

]








A
p
sNF



(
s
)


.







(

Eq
.




17

)







It follows from Equation (17) that A′pSSH(n) is a deterministic function of p and n. (This also follows the fact that SSH dominates SNF in the sense that SNF sketches can be emulated from SSH sketches. That is, given p and n, an SNF sketch can be drawn from Ωn(p)). Using corollary 9.4, the estimator A′pSSH is unbiased and has variance that is at most that of ApSNF over Ωp (and therefore, over any probability space that consists of subspaces of the form of Ωp.)


In Sections 4.1 and 9.1 it is shown that ApSSH(n) is the unique solution of a system of equations. Therefore, it is the only possible assignment of adjusted weights that are a deterministic function of p and n and are unbiased (has expectation |f|) for any possible f and a corresponding probability space Ω(p). Since the estimator A′pSSH(n) is also a deterministic function of n and p and is unbiased on Ω(p) it follows that





ApSSH≡A′pSSH.


9.3 Adjusted Weights for SNF


Theorem 4.10 is proven (derivation of adjusted weights for SNF) using the dominance of SNF over ANF. This proof also establishes the variance relation VAR(ASNF(f|p))≦VAR(ANF(f|pr))


Proof. The ranks of the packets of flows in F\f are fixed. The steps p of the kth smallest rank of a flow in F\f are then fixed. Let n be the number of packets off in each of these steps. (It is assumed without loss of generality that n1>0.)


The subspace V of rank assignments where f is fully counted is considered. Let ASNF(n) be the adjusted weight that f obtains at any point of this subspace. It is shown that ASNF(n) is the average of the adjusted weight of NF in V. Note that the fraction of V is qSNF[n|n].


Consider first points in V where the first packet that has rank at most Pr is a packet t of step 1.


The probability that SNF counted all packets and packet t+1 was the first packet to obtain rank value at most Pr is (p1−pr)tprp1n1−t−1Πh=2nh. Conditioned on this, the adjusted weight assigned by NF is the number of counted packets divided by pr, The expected number of counted packets from step 1 is 1+(n1−t−1)(pr/p1) and the expected number from step 2≦j≦r is nj(pr/pj). Therefore, the expected adjusted weight assigned by NF is (1/prj=1rnj/pj−(t+1)/p1). A sum is taken over t=0, . . . , n1−1 and divided by qSNF[n|n] to obtain the contribution to the average adjusted weight of NF in V of the points where the first packet that has rank at most pr is of step 1.














h
=
2

r








p
h

n
h







t
=
0



n
1

-
1






(


p
1

-

p
r


)

t



p
r




p
1


n
1

-
t
-
1


(





1

p
r


+




j
=
1

r




n
j


p
j



-







(

t
+
1

)


p
1





)







q
sNF



[

n
|
n

]



.




(

Eq
.




18

)







The derivation of the contribution to the average of points where the first packet having rank at most pr is in steps l=2, . . . r−1 is similar to that of Eq. (18), observing that








(


d

l
,
r


-

d

l
,
l



)


p
l

n
l






(


p
l

-

p
r


)

t



p
r



p
l


n
l

-
t
-
1






is the probability that SNF fully counted the flow and the first packet to obtain rank value at most Pr was packet t+1 during step l. (Observe that the contribution of the last step must be zero unless it is the only step, since if the flow is fully counted its rank must be at most pr before the beginning of the last step.) The denominator qSNF[n|n] is omitted from the following two Equations.











(


d

l
,
r


-

d

l
,
l



)


p
l

n
l








t
=
0



n
l

-
1






(


p
l

-

p
r


)

t



p
r





p
l


n
l

-
t
-
l


(


1

p
r


+




j
=
l

r




n
j


p
j



-


t
+
1


p
l



)

.







(

Eq
.




19

)







It is obtained that Eq. (19) (contribution of step l>1) is equal to











(


d

l
,
r


-

d

l
,
l



)




p
r


p
l







t
=
0



n
l

-
1






(



p
l

-

p
r



p
l


)

t



(


1

p
r


+




j
=
l

r




n
j


p
j



-


t
+
1


p
l



)




=


(


d

l
,
r


-

d

l
,
l



)




p
r


p
l




{





(




p
l

-

p
r




p
l



p
r



+




j
=
l

r




n
j


p
j




)






t
=
0



n
l

-
1





(



p
l

-

p
r



p
l


)

t









1

p
l







t
=
0



n
l

-
1






(



p
l

-

p
r



p
l


)

t


t






}






(

Eq
.




20

)







The first sum in the expression above is geometric, and the second is of the form










k
=
0

m




kq
k






for





q


=




p
l

-

p
r



p
l


.





Since,










k
=
0

m



kq
k


=





k
=
0

m



(


f


(

k
+
1

)


-

f


(
k
)



)


=


f


(

m
+
1

)


-

f


(
0
)









where







f


(
x
)


=


1

q
-
1




(


xq
x

-


q

x
+
1



q
-
1



)



,





it





follows





that











k
=
0

m



kq
k


=


1

q
-
1





(



(

m
+
1

)



q

m
+
1



-


q

m
+
2



q
-
1


+

q

q
-
1



)

.






Using these observations, it is obtained that Equation (20) is equal to









=



(


d

l
,
r


-

d

l
,
l



)



{






(




p
l

-

p
r




p
l



p
r



+




j
=
l

r




n
j


p
j




)



(

1
-


(



p
l

-

p
r



p
l


)


n
l



)


+









n
l


p
l





(



p
l

-

p
r



p
l


)


n
l



+




p
l

-

p
r




p
l



p
r






(



p
l

-

p
r



p
l


)


n
l



-



p
l

-

p
r




p
l



p
r







}






=




(




p
l

-

p
r




p
l



p
r



+




j
=
l

r




n
j


p
j




)



(


d

l
,
r


-

d

l
,
l


-

d


l
+
1

,
r



)


+



n
l


p
l




d


l
+
1

,
r



+




p
l

-

p
r




p
l



p
r





d


l
+
1

,
r



-




p

l






-

p
r




p
l



p
r





(


d

l
,
r


-

d

l
,
l



)



=



(


d

l
,
r


-

d

l
,
l



)






j
=
l

r




n
j


p
j




-


d


l
+
1

,
r







j
=

l
+
1


r




n
j


p
j











(

Eq
.




21

)







By applying similar manipulations to Eq. (18), it is obtained that the numerator of that equation is equal to













h
=
1

r








p
h

n
h







j
=
1

r




n
j


p
j





-


d

2
,
r







j
=
2

r




n
j


p
j








(

Eq
.




22

)







Summing the contributions of steps l=1, . . . , r−1 (Eq. (22) and Eq. (21) for l=2, . . . , r−1) and obtain that the total contribution to the expectation is











h
=
1

r








p
h

n
h







j
=
1

r




n
j


p
j





-




l
=
2

r




d

l
,
l







j
=
l

r




n
j


p
j






=




j
=
1

r





n
j


p
j





(





h
=
1

r







p
h

n
h



-




l
=
2

j



d

l
,
l




)

.







Therefore,











A
sNF



(
n
)


=






j
=
1

r





n
j


p
j




(





h
=
1

r







p
h

n
h



-




l
=
2

j



d

l
,
l




)





q
sNF



[

n
|
n

]



.





(

Eq
.




23

)







The proof follows using Eq. (4).


Alternate proof (sketch) based on per-packet HT estimator. Applying the HT estimator, an adjusted h( )-value for each observed packet is obtained. The proof methodology is similar to the one provided for SSH, so only a sketch is provided.


Consider a rank assignment x that results in an SNF sketch with steps p. The sketch includes a flow f with counts n. Let Ni⊂f(i=1, . . . , r) be the set of packets of f that are counted with x at step i.


Each packet is associated with a subspace of rank assignments as follows. For cεNi, the subspace is defined by the following constraints: (i) The rank values of all packets of flows in F\{f} are as in x. (ii) Each packet aε∪j=1rNj\{c} has rank value that is below the current sampling rate at the time the packet arrives. (iii) The rank assignment is such that at the time packet c arrives, flow f is cached with a count that includes all the packets in ∪j=1iNj that precede c.


This is a mapping from a rank assignment x and a packet c into a subspace. The subspaces partition the space of all rank assignments (including those where c is not counted in the sketch).


Next it is shown how to compute, given the sketch and the packet c, the conditional probability, within the subspace which x maps to, that c is counted.


This probability is equal to the probability that all packets in ∪j=1rnj are counted. Consider the subspace defined by (i): The probability that (ii)+(iii) hold given (i) is:


(1/pi)(Πh=1rphnh−Σj=2idj,j). The probability that all packets in ∪j=1rNj are counted given the constraint (i) is










h
=
1

r



p
h

n
h



-




j
=
2

r




d

j
,
j


.






If all packets are counted in the subspace specified by (i), then constraints (ii) and (iii) must hold. Therefore, the probability that c is counted conditioned on (i)+(ii)+(iii) is












h
=
1

r



p
h

n
h



-




j
=
2

r



d

j
,
j






(

1


/



p
i


)



(





h
=
1

r



p
h

n
h



-




j
=
2

i



d

j
,
j




)



.




The adjusted h( )-value of the packet c is then








H
sNF



(
c
)


=





(


h


(
c
)




/



p
i


)






h
=
1

r



p
h

n
h




-




j
=
2

i



d

j
,
j









h
=
1

r



p
h

n
h



-




j
=
2

r



d

j
,
j





.





The adjusted h( )-value of the flow is











H
sNF



(
f
)


=





c

f





H
sNF



(
c
)



=







i
=
1

r





h


(

N
i

)



p
i







h
=
1

r



p
h

n
h





-




j
=
2

i



d

j
,
j









h
=
1

r



p
h

n
h



-




j
=
2

r



d

j
,
j





.






(

Eq
.




24

)







9.4 Covariances

The proof of Lemma 4.11 is based on conditioning on the rank values of packets belonging to flows in F\{(f1,f2}, and the methodology carries over to establish this property for the discretized versions.


Proof. It suffices to show that E(A(f1)A(f2))=w(f1)w(f2) (the superscript L is omitted). The proof method in [4] used to establish zero covariance for rank conditioning estimators is adapted. The sample space is partitioned according to the (k−1)th smallest rank value among the flows in F\{f1,f2}. Consider one part and let rk−1 be that rank value. The product A(f1)A(f2) is positive only when r(f1)<rk−1 and r (f2)<rk−1 (it is zero otherwise, since at least one of f1 or f2 is not included in the sketch). In this case, the effective sampling rate is equal to rk−1. The count obtained for f1 using ASH or ANF only depends on rk−1 and not on the count of f2. Therefore A(f1) and A(f2) are independent conditioned on them both having ranks below rk−1. The expectation of A(f1) under this conditioning is w (>)/PR(r(fi)<rk−1}, and the conditional expectation










E
(


A


(

f
1

)



A


(

f
2

)






(


r


(

f
1

)


<

r

k
-
1



)



(


r


(

f
2

)


<

r

k
-
1



)



)

=




w


(

f
1

)




w


(

f
2

)




PR


{


r


(

f
1

)


<

r

k
-
1



}


PR


{


r


(

f
2

)


<

r

k
-
1



}



.





(

Eq
.




25

)







Therefore, on this part













E


(


A


(

f
1

)




A


(

f
2

)



)


=




PR


{


r


(

f
1

)


<

r

k
-
1



}


PR


{


r


(

f
2

)


<

r

k
-
1



}



w


(

f
1

)




w


(

f
2

)




PR


{


r


(

f
1

)


<

r

k
-
1



}


PR


{


r


(

f
2

)


<

r

k
-
1



}









=




w


(

f
1

)





w


(

f
2

)


.









(

Eq
.




26

)







Next consider SSH. (The proof for SNF is along the same lines and is omitted.) The following property is used: fix the step function p of the current sampling rate and let pr, be the effective sampling rate. The expectation of ASSH(f1) conditioned on r(f1)<Pr is equal to w(f)/PR{r (1)<pr}. The sample space is partitioned according to the step functions of rk−1 and rk (the kth and (k−1)th smallest current rank value among the flows in F\{f1,f2}). Consider a part in this partition. The product A(f1)A(f2) is positive only if r (f1)<rk−1 and r(f2)<rk−1. In this case, the current sampling rate is rk−1. Fix the ranks of f2 packets. The current sampling rate is determined and it is a step function p with effective sampling rate pr=rk−1. The conditioned expectation of A(f1) in this part after fixing f2 ranks, and given that it has r(f 1)<rk−1 is w (f1)/PR{r(f1)<rk−1}. It is independent of the f2 ranks and therefore, the adjusted weight A(f1) and A(f2) in this part, conditioned on them both having ranks below rk−1, are independent. Hence, the conditioned expectation of the product is as in Eq. 25 and therefore Eq. 26 also holds.


9.5 FSD Estimators


The proof of Lemma 5.2 is provided.


Proof. The proof is along the same lines of Lemma 9.2. The expectation of the ASH FSD estimator conditioned on the SSH observed counts and sampling rate steps is computed. Therefore, it is also established that the SSH-based estimator has at most the same variance as the ASH estimator.


Denote by π(p, n,j) the conditional probability of an ASH count j given SSH count n and steps p. For all i≧1,














α
i
sSH



(

p
,
n

)


=






j
=
1



n






π


(

p
,
n
,
j

)





α
i

A

SH




(


p
r

,
j

)










=





π


(

p
,
n
,
i

)



p
r


-




π


(

p
,
n
,

i
+
1


)




(

1
-

p
r


)



p
r


.









(

Eq
.




27

)







If |n|=1 then π(p, n, 1)=1 and π(p, n,j)=0 for j≠1 (the ASH count is 1 with probability 1). Therefore α1SSH(p, n)=1/pr(and αjSSH(p, n)=0 for all j≠1).


If |n|=nr then π(p, n, nr)=1 and π(p, n, j)=0 for j≠nr (the ASH count is nr with probability 1). Therefore, the only nonzero αjSSH(p, n) are αnrSSH(p, n)=1/pr and αnr−1SSH(p, n)=−(1−pr)/pr.


Consider n such that |n|>1 and |n|>nr. Assume WLOG that nt>0 for 1≦l≦r. The probabilities π(p, n, x)>0 are positive if only if |n|≧x≧nr+1 and are as follows:








l
=
2

,





,

r
-

1





and



















h
=

l
+
1


r



<
x





h
=
l

r




n
h



:









π


(

p
,
n
,
x

)


=




(


c

l
,
r


-

c

l
,
l



)



(

1
-

p
r


)






h
=
l

r




n

h

-
1





p
r






q
sSH



[

n

n

]



.












h
=
2

r



n
h


<
x
<




h
=
1

r




n
h



:


















π


(

p
,
n
,
x

)


=



(


c

1
,
r


-

c

1
,
1



)



(

1
-

p
r


)






h
=
1

r




n

h


-
1

-
x





p
r






q
sSH



[

n

n

]










x
=



n




:







π


(

p
,
n
,


n



)


=


p
r



/





q
sSH



[

n

n

]


.









Therefore, αiSSH(p, n) can be nonzero only for |n|≧i≧nr. These values are computed case by case using Eq. (27).








i





such





that









j
=

l
+
1


r



n
j



<
i
<




j
=
l

r



n
j














for





some





2


l


r
-

1


:














α
i
sSH



(

p
,
n

)


=






(


c

l
,
r


-

c

l
,
l



)



(

1
-

p
r


)






h
=
l

r




n

h

-
i





p
r







q
sSH



[

n

n

]




p
r



-












(

1
-

p
r


)



(


c

l
,
r


-

c

l
,
l



)



(

1
-

p
r


)






h
=
l

r




n

h


-
i

-
1





p
r







q
sSH



[

n

n

]




p
r









=


0











if






n
1



3

,

i





such





that
















j
=
2

r



n
j


<
i
<





j
=
1

r



n
j


-

1


:















α
i
sSH



(

p
,
n

)


=






(


c

1
,
r


-

c

1
,
1



)



(

1
-

p
r


)






h
=
1

r




n

h


-
i

-
1





p
r







q
sSH



[

n

n

]




p
r



-












(

1
-

p
r


)



(


c

1
,
r


-

c

1
,
1



)



(

1
-

p
r


)






h
=
1

r




n

h


-
i

-
2





p
r







q
sSH



[

n

n

]




p
r









=


0







i=Σj=lrnj for some 2≦l≦r. If l=2 it is assumed n1>1. If l=r it is assumed nr>0 (because otherwise αnr( ) is not defined.):











α
i
sSH



(

p
,
n

)


=






(


c

l
,
r


-

c

l
,
l



)



p
r





q
sSH



[

n

n

]




p
r



-












(

1
-

p
r


)



(


c

l
,


-
1


r



-

c


l
-
1

,

l
-
1




)




(

1
-

p
r


)



n
l

-
1




p
r





q
sSH



[

n

n

]




p
r









=




-

c

l
,
l





q
sSH



[

n

n

]













i
=





j
=
2

r




n

j
,




n
1



=

1


:



















α
i
sSH



(

p
,
n

)


=






(


c

2
,
r


-

c

2
,
2



)



p
r





q
sSH



[

n

n

]




p
r



-



(

1
-

p
r


)



p
r





q
sSH



[

n

n

]




p
r










=




-

(

1
-

p
2


)




q
sSH



[

n

n

]















-

c

1
,
1



-

c

2
,
2





q
sSH



[

n

n

]














i
=


-
1

+




j
=
1

r



n
j




,


n
1

>

1


:



















α
i
sSH



(

p
,
n

)






=






(


c

1
,
r


-

c

1
,
1



)



p
r





q
sSH



[

n

n

]




p
r



-



(

1
-

p
r


)



p
r





q
sSH



[

n

n

]




p
r










=




-

(

1
-

p
1


)




q
sSH



[

n

n

]









=




-

c

1
,
1





q
sSH



[

n

n

]













i
=




j
=
1

r




n
j



:



















α
i
sSH



(

p
,
n

)


=





p
r




q
sSH



[

n

n

]




p
r



-
0







=



1


q
sSH



[

n

n

]










9.6 Estimators with Negative Covariances



ANF adjusted weights. A direct proof for the ANF adjusted selectivities is provided.


Lemma 9.6. Let n: F be the ANF counts. For all







f

F

,



R

A

NF




(
f
)


=


n


(
f
)



n


(
F
)








are unbiased selectivities, that is,






E(RANF(f))=w(f)/w(F).


Proof. Per-packet adjusted selectivities are assigned such that for each packet v, RANF(v)=1/n(F) if v is counted and RANF(v)=0 otherwise.


RANF(f)=ΣvεfRANF(v). It suffices to show that for each packet v, E(RANF(v))=1/w(F).


The rank-based view of the sample space is used. Consider a rank assignment and the permutation of the packets according to their order by increasing rank value. Order the flows by the position of their first packet. Then n(F)+1 is the position of the first packet of the (k+1)st flow in this order. The first k flows are the ones included in the sketch.


Consider a packet vεf and a partition of rank assignments over F \{v} (all packets other than v) according to the induced permutation on these packets. For each permutation, a corresponding value of l is defined as follows. If the first k flows in the induced permutation on F\{v} include f then l is the position of the first packet of the (k+1) st flow. If the first k flows do not include f then l is the position of the first packet of the (k)th flow.


Consider a probability subspace in this partition and the respective value of l. The packet v is counted if and only if its position in the permutation is at most l. The conditional probability (in this subspace) that v is counted is l/w(F). In this case there are l counted packets (n(F)=l) and the adjusted selectivity of v is 1/l. So in this subspace







E


(


R

A

NF




(
v
)


)


=




l

w


(
F
)





1
l


+




w


(
F
)


-
l


w


(
F
)




0


=

1


/




w


(
F
)


.







The effective sampling rate distribution is determined by w(F) and the observed counts n: F={(f, n(f))}. Consider a partition of the sample space according to n: F, and denote by Ω(L,n:F) the subspace that corresponds to n: F. It will be shown that the estimator A+L (f, n: F, w (F)) is the expectation of the estimator AL(n(f)) over Ω(L,n:F) for LεANF, ASH. Therefore, the relation VAR(A+L(f))≦VAR(AL(f)) for all fεF follows using Corollary 9.4.


Lemma 9.7. For any flow fεF,






VAR(A+ANF)≦VAR(AANF(f)).


Proof. Consider a subspace Ω(n:F). In this subspace, A+ANF(f))≡w(F)n(f)/n(F) is fixed. It is shown that within Ω(n:f),






E(AANF(f))=E(w(F)RANF(f))=w(F)n(f)/n(F).


AANF(f) is equal to n(f) divided by the effective sampling rate, which is the n(F)+1 smallest rank value. If the subspace contains a rank assignment, it contains all rank assignments that result in the same permutation (rank ordering) of packets. The effective sampling rate distribution in Ω(n:F) is that of the n(F)+1 smallest among w(F) independent random variables from U[0,1]. The expectation of the inverse of the ith smallest among n independent draws from U[0,1] is known to be n/(i−1). Therefore, the expectation of the inverse of the effective sampling rate in Ω(n:F) is w(F)/n(F) and






E
Ω(n:F)(AANF(f))=EΩ(n:F)(n(f)/p′)=w(F)n(f)/n(F).


Lemma 9.8. For any two flows f1≠f2,






COV(RANF(f1),RANF(f2))≦0.


Proof. It should be shown that






E(RANF(f1)RANF(f2))≦ρ(f1)ρ(f2).  (Eq. 28)


By definition









R

A

NF




(

f
1

)





R

A

NF




(

f
2

)



=





v
1



f
1









v
2



f
2







R

A

NF




(

v
1

)





R

A

NF




(

v
2

)

















ρ

A

NF




(

f
1

)





ρ

A

NF




(

f
2

)



=







v
1



f
1









v
2



f
2







ρ

A

NF




(

v
1

)





ρ

A

NF




(

v
2

)











=







v
1



f
1









v
2



f
2





1


/




w


(
F
)


2











From linearity of expectation, a sufficient condition for Eq. (28) is that for any v1εf1 and v2εf2,






E(RANF(v1)RANF(v2))≦1/w(F)2.  (Eq. 29)


Consider a partition of the sample space according to the induced permutation on the packets w(F)\{v1, v2}. It is shown that Eq. (29) holds within each subspace. Consider such a permutation and define l as follows. If the first k flows in w(F)\{v1, v2} include both f1 and f2, then l is the position of the first packet of the (k+1)st flow. Otherwise, if the first k−1 flows include exactly one of {f1, f2} (observe that the other cannot be the kth flow), then l is the position of the first packet of the kth flow. Otherwise, (the first k−1 flows do not include either of {f1, f2}), l is the position of the first packet of the (k−1)th flow.


The packets v1 and v2 are both counted (and both are assigned non-zero adjusted selectivities) if and only if they both appear before the l th packet of the induced permutation on w(F)\{v1, v2}, which is equivalent to saying that their positions in the permutation over w(F) is at most l+1. This happens with probability







l


w


(
F
)


-
1






l
+
1


w


(
F
)



.





In this case there are l+1 counted packets and each packet is assigned adjusted selectivity 1/(l+1). Therefore, in this subspace










E


(



R

A

NF




(

v
1

)





R

A

NF




(

v
2

)



)


=





l


(

l
+
1

)




w


(
F
)




(


w


(
F
)


-
1

)





1


(

l
+
1

)

2









=





1

w


(
F
)





l

l
+
1




1


w


(
F
)


-
1






1


w


(
F
)


2


.









(The last inequality follows using l<w (F)−1.)



ASH adjusted weights A dominance relation can be used to define the adjusted selectivities for L E {ASH, SSH, SNF}. The relation used for adjusted weights emulates an ANF sketch from L's counts and sampling rate (effective sampling rate or sampling rate steps). Correct adjusted selectivities that do not depend on w(F) can be obtained by taking the expectation of the ANF adjusted selectivities over the corresponding subspace of rank assignments.


Done this way, the adjusted selectivities assignment depends on the counts and sampling rate. Better estimators (lower variances) are obtained using an assignment that is based on a coarser partition of the sample space. The assignment depends on w(F) and the counts but not on the sampling rate.


Consider an ASH sketch, let n: F be the ASH counts and let Ω(n:F) be the probability subspace of all rank assignments with ASH counts n: F.


Lemma 9.9. The following is a correct adjusted selectivities assignment








R

A

SH




(
f
)


=


1

w


(
F
)






(


n


(
f
)


+



w


(
F
)


-

n


(
F
)



k


)

.






RASH(f) is equal to the expectation of RANF(f) over Ω(n:F) and


A+ASH(f)=w(F)RASH (f) is equal to the expectation Of AASH (f) over Ω(n:F)


Proof. The packets of F are partitioned into three groups R∪S∪O as follows. R is the set of first-counted packets of the sketched flows (|R|=k), S is the set of subsequent counted packets (|S|=n(F)−k), and O=F\S\R(|O|=w(F)−n(F)) is the set of “uncounted” packets. A particular ASH count (the rank assignment is in Ω(n:F)) is obtained if and only if the permutation over the packets has the property that the packets of R have lower ranks than the packets of O.


The distribution of ANF counts in the subspace Ω(n:F) is considered. The expectation of A+ANF(v) for all ASH-counted packets is computed. In all rank assignments in Ω(n:F), the packets of R are counted by ANF and the packets of O are not. A packet from S is counted by ANF if and only if its position in the permutation over F is before all packets of O. The total number of permutations over F that lie in Ω(n:F) are













S


!





R


!





O


!



(




w


(
F
)









R


+


O






)


=




k
!




(


w


(
F
)


-

n


(
F
)



)

!




w


(
F
)


!




(


w


(
F
)


-

n


(
F
)


+
k

)

!


.





(

Eq
.




30

)







The number of permutations over F with exactly lε{0, . . . , n(F)−k} ANF-counted packets from S (that is, total of l+k ANF-counted packets) is





(l|S|)(l+k)!|O|(|S|−l+|O|−1)!=(ln(F)−k)(l+k)!(w(F)−n(F))(w(F)−k−l−1)!  (Eq. 31)


The probability in Ω(n:f) that exactly l packets from S are counted is the ratio of Eq. (31) and Eq. (30):








p
l



(


w


(
F
)


,

n


(
F
)


,
k

)


==







(


n


(
F
)


-
k

)

!




(

l
+
k

)

!









(





w


(
F
)


-






k
-
l
-
1




)

!




(


w


(
F
)


-

n


(
F
)


+
k

)

!







l
!




(


n


(
F
)


-
k
-
l

)

!



k
!




(


w


(
F
)


-

n


(
F
)


-
1

)

!




w


(
F
)


!







Consider the subspace of Ω(n:F) that includes all permutation such that there are l counted packets from S. The probability that a packet cεS is ANF-counted is l/(n(F)−k). If counted, it is assigned adjusted selectivity 1/(l+k). Therefore, the corresponding ASH-adjusted selectivity of these packets is








R








A

SH





(
c
)


=


l


(


n


(
F
)


-
k

)



(

l
+
k

)



..





The probability that a packet cεR is ANF-counted is 1 and therefore








R








A

SH





(
c
)


=


1

l
+
k


.





Hence, for a flow f,








R








A

SH





(
f
)


=




l
=
0



n


(
F
)


-
k






p
l



(


w


(
F
)


,

n


(
F
)


,
k

)







n


(
F
)


-
k
+

l


(


n


(
f
)


-
1

)





(


n


(
F
)


-
k

)



(

l
+
k

)



.







The equality R=ASH(f) RASH(f) follows by standard manipulations.


The expectation A′ASH(f) of AASH(f) over this subspace is next considered. Consider the subspace of all permutation such that there are l counted packets from S. The distribution of the inverse sampling rate is that of the (k+l+1) smallest of w(F) independent random variables from U[0,1]. The expectation is therefore w(F)/(k+l) and the expectation of AASH(f) is n(f)−1+w(F)/(k+l). Therefore,








A








A

SH





(
f
)


=




l
=
0



n


(
F
)


-
k






p
l



(


w


(
F
)


,

n


(
F
)


,
k

)





(


n


(
f
)


-
1
+


w


(
F
)



(

k
+
l

)



)

.







The relation A′ASH(f)=A+ASH(f) follows by standard manipulations.


The intuition for this expression is to view the process as the packets in O∪R being subjected to uniform sampling of k packets, and therefore, each packet obtains an adjusted selectivity of 1/k (in R∪O) and adjusted weight of |O∪R|/k and selecting all packets in S and therefore each packet obtains an adjusted selectivity of 1/|S| (in S) and adjusted weight of 1. Therefore, n(f)−1+|O∪R|/k are adjusted weights for f.


It follows from Lemma 9.9 and Lemma 9.4 that VAR(A+ASH(f))≦VAR(AASH(f)) and VAR(A+ASH(f))≦VAR(AANF(f)) for all fεF. Using a similar proof to Lemma 9.8 it can be shown that for all f1≠f2,






COV(A+ASH(f1),A+ASH(f2))≦0.


Adjusted count and FSD ASH estimators. The expectation of the inverse sampling rate over Ω(n:F) is










l
=
0



n


(
F
)


-
k






p
l



(


w


(
F
)


,

n


(
F
)


,
k

)





w


(
F
)


/

(

k
+
l

)




=




w


(
F
)


-

n


(
F
)


+
k

k

.





The ASH adjusted counts and FSD estimators depend on the counts and linearly on 1/p. Their expectation over Ω(n:F) constitutes a tighter unbiased estimator. This expectation is obtained by replacing 1/p with its expectation









w


(
F
)


-

n


(
F
)


+
k

k

.




10 Additional Observations and Embodiments


Accurate summarization of IP traffic is essential for many network operations. The present invention provides summarization algorithms that generate a sketch of the packet streams that allows processing of approximate subpopulation size queries and other aggregates. The algorithms build on existing designs, but are yet able to obtain significantly better estimates through better utilization of available resources and careful derivation of unbiased statistical estimators that have minimum variance with respect to the information they use.


A system and computer-readable medium in accordance with the present invention, which incorporate at least some of the preferred features, is intended to be within the scope of the present invention. The system may be implemented using at least one of a microprocessor, a microcontroller, programmable logic, and/or an application specific integrated circuit (ASIC) with or without software and/or firmware. The computer-readable medium may include a compact disc (CD), digital video disc (DVD), and/or tape, which include instructions that when executed by at least one computing device performs the methods in accordance with the present invention.


Although preferred embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments and that various other changes and modifications may be affected herein by one skilled in the art without departing from the scope or spirit of the invention, and that it is intended to claim all such changes and modifications that fall within the scope of the invention.


The following references are referred to above and incorporated herein by reference:

  • [1] E. Cohen. Size-estimation framework with applications to transitive closure and reachability. J. Comput. System Sci., 55:441-453, 1997.
  • [2] E. Cohen, N. Duffield, H. Kaplan, C. Lund, and M. Thorup. Algorithms and estimators for accurate summarization of Internet traffic. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC), 2007.
  • [3] E. Cohen, N. Duffield, H. Kaplan, C. Lund, and M. Thorup. Sketching unaggregated data streams for subpopulation-size queries. In Proc. of the 2007 ACM Symp. on Principles of Database Systems (PODS 2007). ACM, 2007.
  • [4] E. Cohen and H. Kaplan. Bottom-k sketches: Better and more efficient estimation of aggregates. In Proceedings of the ACM SIGMETRICS 07 Conference, 2007. poster.
  • [5] E. Cohen and H. Kaplan. Sketches and estimators for subpopulation weight queries. Manuscript, 2007.
  • [6] E. Cohen and H. Kaplan. Spatially-decaying aggregation over a network: model and algorithms. J. Comput. System Sci., 73:265 288, 2007.
  • [7] E. Cohen and H. Kaplan. Summarizing data using bottom-k sketches. In Proceedings of the ACM PODC 07 Conference, 2007.
  • [8] C. Cranor, T. Johnson, V. Shkapenyuk, and O. Spatcheck. Gigascope: A stream database for network applications. In Proceedings of the ACM SIGMOD, 2003.
  • [9] N. Duffield, C. Lund, and M. Thorup. Estimating flow distributions from sampled flow statistics. In Proceedings of the ACM SIGCOMM 03 Conference, pages 325 336, 2003.
  • [10] N. Duffield, M. Thorup, and C. Lund. Flow sampling under hard resource constraints. In Proceedings the ACM IFIP Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance), pages 85 96, 2004.
  • [11] C. Estan, K. Keys, D. Moore, and G. Varghese. Building a better netflow. In Proceedings of the ACM SIGCOMM 04 Conference. ACM, 2004.
  • [12] C. Estan and G. Varghese. New directions in traffic measurement and accounting. In Proceedings of the ACM SIGCOMM 02 Conference. ACM, 2002.
  • [13] P. Gibbons and Y. Matias. New sampling-based summary statistics for improving approximate query answers. In SIGMOD. ACM, 1998.
  • [14] J. M. Hellerstein, P. J. Haas, and H. J. Wang. Online aggregation. In Proceedings of the ACM SIGMOD, 1997.
  • [15] N. Hohn and D. Veitch. Inverting sampled traffic. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pages 222 233, 2003.
  • [16] K. Keys, D. Moore, and C. Estan. A robust system for accurate real-time summaries of Internet traf c. In Proceedings of the ACM SIGMETRICS 05. ACM, 2005.
  • [17] A. Kumar, M. Sung, J. Xu, and E. W. Zegura. A data streaming algorithm for estimating subpopulation flow size distribution. ACM SIGMETRICS Performance Evaluation Review, 33, 2005.
  • [18] S. Ramabhadran and G. Varghese. Efficient implementation of a statistics counter architecture. In Proc. of ACM Sigmetrics 2003, 2003.
  • [19] B. Ribeiro, D. Towsley, T. Ye, and J. Bolot. Fisher information of sampled packets: an application to flow size estimation. In Proceedings of the 2006 Internet Measurement Conference. ACM, 2006.
  • [20] D. Shah, S. Iyer, B. Prabhakar, and N. McKeown. Maintaining statistics counters in router line cards. IEEE Micro, 22(1):76 81, 2002.
  • [21] M. Szegedy and M. Thorup. On the variance of subset sum estimation. In Proc. 15th ESA, 2007.
  • [22] E. Cohen, N. Duffield, H. Kaplan, M. Thorup and C. Lund. Algorithms and estimators for summarization of unaggregated data streams. Sep. 10, 2007.

Claims
  • 1. A method of obtaining a sketch of an unaggregated packet stream comprising: aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate;counting the aggregated packets using Adaptive Sample-and-Hold (ASH);adjusting the sampling rate based on a quantity of flows to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps; andtransferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate.
  • 2. The method of claim 1, further comprising calculating an adjusted weight of each flow using:
  • 3. The method of claim 2, further comprising summing the adjusted weights of each flow in a subpopulation of flows to obtain a size of the subpopulation of flows.
  • 4. The method of claim 3, wherein the subpopulation of flows is associated with at least one of a protocol, source, and application.
  • 5. The method of claim 1, further comprising sampling all packets at a fixed rate Phase to obtain a pbase-sampled stream to reduce the packet stream before aggregating and counting.
  • 6. The method of claim 1, further comprising decreasing the sampling rate in response to i) a quantity of cached flows being equal to a maximum quantity of cached flows, andii) a sampled packet not being associated with a cached flow, using three tunable parameters μ, pstart and pbase, wherein 0<μ<1, pbase≦1 and pstart≦pbase and sampling rates are of the form (pstart/pbase)μt where t is a nonnegative integer.
  • 7. The method of claim 6, further comprising calculating an adjusted weight of a flow using:
  • 8. A method of obtaining an unbiased estimate of a quantity of flows of size i in a packet stream comprising: aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate;counting the aggregated packets using Adaptive Sample-and-Hold (ASH);adjusting the sampling rate based on a count of the aggregated packets to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps;transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate;calculating the unbiased estimate αiSSH(p,n),p being a sampling rate vector for a flow with count vector n and
  • 9. The method of claim 8, wherein the flows of size i belong to one subpopulation of flows.
  • 10. A method of obtaining a sketch of an unaggregated packet stream comprising: aggregating sampled packets in accordance with a flow associated with the sampled packets, the packets being sampled from the packet stream at a sampling rate;counting the aggregated packets using Adaptive NetFlow (ANF);adjusting the sampling rate based on a quantity of flows to obtain a sketch having a predetermined size, the sampling rate being adjusted in steps;transferring the count of aggregated packets from SRAM to DRAM and initializing the count in SRAM following adjustment of the sampling rate; andcalculating an adjusted weight of cached flows using the count of aggregated packets.
  • 11. The method of 10, wherein the adjusted weight of each flow is calculated using:
  • 12. The method of claim 11, further comprising summing the adjusted weight of each flow in a subpopulation of flows to obtain the size of the subpopulation of flows.
  • 13. The method of claim 12, wherein the subpopulation of flows is associated with at least one of a protocol, source, and application.
  • 14. The method of claim 10, further comprising decreasing the sampling rate in response to i) a quantity of cached flows being equal to a maximum quantity of cached flows, andii) a sampled packet not being associated with a cached flow, using three tunable parameters μ, pstart and pbase, wherein 0<μ<1, pbase≦1 and pstart<pbase and sampling rates are of the form (pstart/pbase)μt where t is a nonnegative integer.
  • 15. The method of claim 14, further comprising calculating an adjusted weight using: