The present invention relates generally to network characterization of packet delay, and more particularly to network characterization of packet delay by multicast-based inference.
Packet data networks, such as Internet Protocol (IP) networks, were originally designed to transport basic data in a packetized format. Increasingly, however, other services, such as voice over IP (VoIP) and video on demand (VOD), are utilizing packet data networks. These services, in general, have more stringent requirements for network quality of service (QoS) than basic data transport. Depending on the application, QoS is characterized by different parameters. In addition to packet loss, an important parameter is packet delay. Services such as VoIP, for example, operate in real time (or, at least, near-real time). Excessive delay will result in poor voice quality. Even if only data is being transported, competing services using the same transport network may have different QoS requirements. For example, near-real time system control will have more stringent delay requirements than download of music files. In some instances, QoS requirements are set by service level agreements between a network provider and a customer.
Measurement of various network parameters is essential for network planning, architecture, administration, and diagnostics. Some parameters may be measured directly by network equipment, such as routers and switches. Since different network providers typically do not share this information with other network providers and with end users, however, system-wide information is generally not available to a single entity. Additionally, the measurement capabilities of a piece of network equipment are typically dependent on proprietary network operation systems of equipment manufacturers. The limitations of internal network measurements are especially pronounced in the public Internet, which comprises a multitude of public and private networks, often stitched together in a haphazard fashion.
A more general approach to network characterization, therefore, needs to be independent of measurements captured by equipment internal to the transport network. That is, the measurements need to be performed by user-controlled hosts attached to the network. One approach is for one host to send a test message to another host to characterize the network link between them. A standard message widely utilized in IP networks is a “ping”. Host A sends a ping to Host B. Assuming that Host B is operational, if the network connection between Host A and Host B is operational, Host A will receive a reply message from Host B. A field in the reply message records the round-trip time (RTT). If Host A does not receive a reply within a user-defined timeout interval, it declares the message to have been lost. Pings are examples of point-to-point messages between two hosts. As the number of hosts connected to the network increases, the number of point-to-point test messages increases to the level at which they are difficult to administer. They may also produce a significant load on both the hosts and the transport network. A key requirement of any test tool is that it must not corrupt the system under test. In addition to the above limitations, in some instances, pings may not provide the level of network characterization required for adequate network planning, architecture, administration, and diagnostics.
What is needed is a network characterization tool which provides detailed parameters on the network, runs on hosts controlled by end users, and has minimal disturbance on the operations of the hosts and transport network.
Temporal delay characteristics in packet data networks are characterized by multicast-based inference. A packet data network comprises a set of nodes connected by a set of paths. Each path may comprise a set of individual links. In multicast-based inference, multiple test messages (probes) are multicast from a source node to a set of receiver nodes. Each receiver node records the delays of the probes transmitted along an end-to-end path from the source node to the receiver node. From the aggregate delay data collected by the set of receiver nodes, temporal delay characteristics of individual links may be calculated. In addition to average delay per unit time, temporal delay characteristics comprise parameters such as the number of probes with delays less than a specified value and the number of probes with delays greater than a specified value. Probes with delays greater than a threshold value may be declared to be lost probes. In embodiments in which the topology of the packet data networks are trees, calculations may be simplified by a process of subtree partitioning.
These and other advantages of the invention will be apparent to those of ordinary skill in the art by reference to the following detailed description and the accompanying drawings.
Nodes are connected via network links, which comprise physical links and logical links. In
In an embodiment, characterization of packet data network 102 is performed by multicasting test messages from a source node (for example, end-user node 106) to receiver nodes (for example, end-user nodes 104, 108, and 110). Analysis of the test messages transmitted from source node 106 and received by a specific receiver node (for example, node 104) yields characteristics of the path from the source node 106 to the specific receiver node 104. In addition, test messages received at all the receiver nodes may be aggregated to infer characteristics of internal network links. For example, in
The process of characterizing a packet data network by multicasting test messages from a source node and analyzing the aggregate of test messages received by multiple receiver nodes is referred to herein as “multicast-based inference of network characteristics (MINC)”. Previous applications of MINC have characterized average packet loss. (Herein, “packet loss” will be referred to simply as “loss”.) See, for example, R. Caceres et al., “Multicast-Based Inference of Network-Internal Loss Characteristics,” IEEE Transactions in Information Theory, vol. 45, pp. 26-45, 2002. Average loss, however, provides only coarse characterization of network loss characteristics. It is well known, for example, that packet data networks are susceptible to noise (for example, electromagnetic interference), which may cause packets to be lost. Losses may be much greater during a noise burst than during quasi-quiet periods. It is also well known, for example, that traffic in packet data networks is bursty. Traffic congestion may cause packets to be lost. Losses may be much greater during heavy traffic load than during light traffic load. Simple average values of loss, therefore, do not adequately capture network characteristics. Advantageous procedures for MINC described herein expand the range of network characterization to include temporal loss characteristics and temporal delay characteristics of packet data networks. Herein, “temporal loss characteristics” refers to values of network loss as a function of time. Examples of temporal loss characteristics are discussed below.
Advantageous procedures for MINC are illustrated herein for packet data networks with a tree topology.
In the tree model illustrated in
In MINC, test messages are multicast from a single source node to multiple destination nodes, which are the receiver nodes under test. In
As shown in
In embodiments in which the network parameter under test is loss, the multicast process is characterized by node states and link processes. The source node root node 0202 transmits a discrete series of probes probe i, where the index i is an integer 1, 2, 3 . . . . The node state Xl(i) indicates whether probe i has arrived at node l. The value Xl(i)=1 indicates that probe i has arrived at node l. The value Xk(i)=0 indicates that probe i has not arrived at node l, and has therefore been lost. In
The link process Zl(i) indicates whether link l is capable of transmission during the interval in which probe i would attempt to reach node l, assuming that probe i were present at the father node f(l). The value Zl(i)=1 indicates that the link is capable of transmission. The value Zl(i)=0 indicates that the link is not capable of transmission. If node r is a destination node which is a receiver node under test, then Xr(i) provides loss statistics on the end-to-end path connecting source node root node 0 to node R. The aggregate data collected from a set of receiver nodes {node R} characterizes the set of end-to-end paths from source node root node 0 to each receiver node. A goal of MINC is to use the aggregate data to infer temporal characteristics of loss processes determining the link processes Zl={Zl(i)} along individual links internal to the network. Examples of model link loss processes Zl={Zl(i)} include Bernoulli, On-Off, and Stationary Ergodic Markov Process of Order r.
An example of MINC, in which the parameter under test is loss, is illustrated in
In step 402, the probe index i is initialized to 1. In step 404, source root node 0304 multicasts probe i 314 to destination nodes node d 306-node g 312. In step 406, each individual destination node, node d 306-node g 312 collects data from probe i 314. In this instance, the data comprises records (observations) of whether the probe has arrived at a destination node.
The data is collected in a database which may be programmed in source root node 0304, destination nodes node d 306-node g 312, or on a separate host which may communicate with root node 0304 and destination nodes node d 306-node g 312. In step 408, the probe index i is incremented by 1. In step 410, the process returns to step 404, and steps 404-408 are iterated until four probes have been multicast. The process then continues to step 412, in which the probe data is outputted. In step 414, temporal link-loss characteristics of packet data network 302 are inferred from the probe data outputted in step 412. Details of the inference process are discussed below.
An example of data outputted in step 412 is shown in table 412A, which comprises columns (col.) 416-424 and rows 426-434. In row 426, the column headings indicate probe index i col. 416 and destination nodes node d col. 418-node g col. 424. Column 416, rows 428-434, track the probes, probe i,i=1-4. The entries in rows 428-434, col. 418-424, track the set of node states Xl={Xl(i)}, where l=d-g and i=1-4. A node state has the value 1 if the probe arrived (was received), and the value 0 if the probe was lost (was not received).
The process illustrated in the flow chart shown in
As discussed above, average loss (in a specified time interval) does not provide adequate characterization of links. Examples of more detailed link-loss parameters include the mean length of a pass-run, the mean length of a loss-run, and the probability that the length of a pass-run or loss-run exceeds a specific value. As discussed above, advantageous procedures process the aggregate data recorded (collected) from probes received at the destination nodes to estimate the link-loss parameters of interest for individual links within the network. As discussed above, a “path” is an end-to-end network link connecting one node to another node. A path may comprise multiple links. Herein, “path passage” refers to successful transmission of a probe across a path. Herein, “link passage” refers to successful transmission of a probe across a link. Individual link passage characteristics are inferred from measured path passage characteristics. Below, a system of equations describing path passage characteristics as functions of link passage characteristics is first derived. The path passage characteristics are values which are calculated from the aggregate data. Solutions to the system of equations then yield the link passage characteristics. In some instances, the solutions are approximate, and the approximate solutions yield estimates of the link passage characteristics.
As an example, let Pk be a random variable taking the marginal distribution of a pass-run, then the mean pass-run length is:
Similarly, values such as mean loss-run length, probability that a pass-run is greater than a specified value, and probability that a loss-run is greater than a specified value may be calculated.
Methods to estimate parameters of interest are described herein. The following parameters and functions are defined herein:
I={i1, i2, . . . is)} where s is an integer, s≧1, (Eqn 2)
χl(I)={{Xl(i)}: Xl(i1)=Xl(i2)= . . . Xl(is)=1} (Eqn 3)
l(I)={{Zl(i)}: Zl(i1)=Zl(i2)= . . . Zl(is)=1} (Eqn 4)
αl(I)=Pr[ (I)]=Pr[χl(I)|χf(l)(I)] (Eqn 5)
(I)=Pr[χl(I)]=αl(I)(I) (Eqn 6)
An example is discussed with respect to the tree model previously shown in
Assume that probe 1-probe 4 all arrive at node k 204. Then, in Eqn 3, χk(I)={Xk(1)=Xk(2)=Xk(3)=Xk(4)=1}. Further assume that probe 1, probe 2, and probe 3 all arrive at node b 206, but probe 4 is lost. In this instance, in Eqn 4, (I)={Zb(1)=Zb(2)=Zb(3)=1}, and, at node b 206, χb(I)={Xb(1)=Xb(2)=Xb(3)=1}. In Eqn 5, the link pattern passage probability is αb(I)=Pr[(I)=Pr[χb(I)|χk(I)]. Or, in terms of this simple example, if probe 1 arrives at node k 204, the probability of probe 1 arriving at node b is equal to the probability that the link passage probability across link b 220 is l. A similar analysis applies for the other probes and other nodes.
In Eqn 7, now consider node l=node d 210, one of the receiver nodes which collects data. The set of ancestors of node d, denoted above as α(d) in Eqn 7, comprises {node b 206, node k 204, root node 0202}. For a probe probe i, the probability of path passage (i) from root node 0202 to receiver node d 210 is equal to the product of the probability of link passage across link k 218×the probability of link passage across link b 220×the probability of link passage across link d C22. A similar analysis holds for the other receiver nodes, node e 212-node g 216. A goal of MINC is to use the data collected at receiver nodes, node d 210-node g 216, to estimate the link passage probabilities across links, link k 218-link g 230. In a more generalized example, a goal is to estimate the link pattern passage probability αl(I) of arbitrary patterns for all internal links l. These can be extracted from Eqn. 6 if (I) is known for all l, l≠0. In general, solving a polynomial equation of order >1 is required.
In an embodiment, path passage probabilities are calculated as a function of link passage probabilities by a process of subtree partitioning, which results in lower order polynomial equations. For example, subtree partitioning may result in a linear equation instead of a quadratic equation. The underlying concept of subtree partitioning is illustrated for a binary tree in the example shown in
In an example for a binary tree with subtree partitioning, path passage probabilities are calculated as follows. The following parameters and functions are defined herein.
Y
k,0(I)=Yk,l(i)VYk,2(i) (Eqn 9)
γk,c(i)=Pr[Yk,c(i)=1 , for c ε {0, 1, 2} (Eqn 10)
Then, the values (i) of may be calculated as:
(i)=Pr[χk(i)=γk,0(i), for k ε R, (Eqn 11)
γk,0(i)=(i)βk,0(i) (Eqn 13)
γk,0(i)=(i){1−(1−γk,1(i)/(i))(1−γk,2(i)/(i))} (Eqn 14)
Eqn 14 is linear in (i) and can be solved:
If the network comprises an arbitrary tree, in which a branch node may have more than two child nodes, the corresponding equation for (i) is a polynomial equation of order |dk|−1, where |dk| is the number of children of node k. In an example, the order of the equation may be reduced (for example, from quadratic to linear) by a more generalized subtree partitioning procedure. An example is shown in
As discussed above, Eqn 15 apply for a single probe i. Another parameter of interest is the joint probability of a probe pattern I. In an example in which subtree partitioning is used, this parameter is calculated as follows.
Here denotes bitwise AND.
Y
k,0(I)=Yk,1(I)Yk,2(I) , where c=0 (Eqn 18)
If subtree partitioning is not used, then the values corresponding to Eqn. 12 are
The resulting equation for (I) is not linear, but a polynomial of order |dk|−1. Subtree partitioning is advantageous because is Eqn 19 linear.
In the subtree partitioning schemes described above, all probes in I passed through node k and reached receivers via nodes all within a single subtree. These schemes do not capture cases in which probes reach receivers for each index in I in a distributed way across the two subtrees, Tk,1 and Tk,2. In a further example of subtree partitioning, this limitation is removed, and (I) may be derived from all trials which imply χk(I).
In one example, for I={i,i+1}, and l, m, n, o ε {0,1}:
[l]=Pr[X
k(i)=l] (Eqn 22)
[lm]=Pr[X
k(i)=l, Xk(i)=(i+1)=m] (Eqn 23)
γk,c(l)=Pr[Yk,c=l], for c={1, 2} (Eqn 25)
γk,c[lm]=Pr[Yk,c(i)=l, Yk,c(i+1)=m], for c={1, 2} (Eqn 26)
βk,c(l)=Pr[Yk,c(i)=l|χ(i)], for c={1, 2} (Eqn 28)
βk,c(lm)=Pr[Yk,c(i)=l, Yk,c(i+1)=m |χ(i)], for c={1, 2} (Eqn 29)
γk[11]=Pr[Yk(i)=1, Yk(i+1)=1] (Eqn 30)
Then trials which imply χk(I) are
γk[11]=γk[10,01]+γk[01,10]+γk,1[11]+γk,2[11]−γk[11,11] (Eqn 31)
where γk[10,01] and γk[01,10] capture those missed by Yk,0
From the conditional independence of the two trees,
As before,
γk,c[11]=[11]βk,1[11], for c={1, 2} (Eqn 33)
therefore,
γk,c[lm]=[11]βk,c[lm]+([1]-[11])γk,c[1]/[1] (Eqn 34)
For the above tree and subtree partitioning schemes, estimators for parameters of interest may be derived. From n trials, samples of variables Yk,c(I) are collected for each I of interest. Values of γk,c(I) may then be estimated using the empirical frequencies:
The values of {circumflex over (γ)}k,c(I) are then used to define an estimator k(I) for (i). In the case of subtree partitioning, this is done by substituting into the relevant equation for (i). Otherwise, the unique root in [0,1] of the polynomial is found numerically. Another parameter of interest, the link joint passage probabilities, is estimated by
The analysis above yields three categories of estimators, all of which work on arbitrary trees and arbitrary probe patterns I. These categories are defined herein. “General” , based on Eqn 21, applies to instances in which there is no subtree partitioning and in which k(i) is solved numerically if the tree is non-binary. “Subtree”, based on Eqn 19, applies to instances in which there is subtree partitioning. “Advanced subtree”, based on Eqn 32, yields a quadratic in (I) when using subtree partitioning.
In another embodiment, the parameter of interest is delay. In the examples discussed above, in which the parameter of interest was loss, the multicast process was characterized by node states and link processes. The node state Xl(i) indicated whether probe i had arrived at node l. The link process Zl(i) indicated whether link l was capable of transmission during the interval in which probe i would have attempted to reach node l, assuming that probe i had been present at the father node f(l). For delay, the multicast process is characterized by two processes. The delay measurement process Xl(i) records the delay along link l. The delay is the difference between the time at which probe i is transmitted from the father node f(l) of node l (assuming probe i has reached f(l)) and the time at which it is received by node l. The link process Zl(i) is the time delay process which determines the delay encountered by probe i during its transmission from f(l) to node l. In an embodiment, a series of probes, probe i, is transmitted from source node root node 0 to a receiver node node R. At receiver node node R, the total end-to-end path delay from source node root node 0 to node R is recorded. The aggregate data collected from a set of receiver nodes {node R} characterizes the set of end-to-end paths from source node root node 0 to each receiver node. Previous applications of MINC calculated average delays per unit time. See F. Lo Presti et al., “Multicast-based Inference of Network-Internal Delay Distributions,” IEEE/ACM Transactions on Networking, vol. 10(6), pp. 761-775, 2002. An advantageous application of MINC uses the aggregate data to infer temporal characteristics of delay processes determining the link processes Zl={Zl(i)} along individual links internal to the network. Examples of link delay processes include Bernoulli Scheme, Stationary Ergodic Semi-Markov Process, and Stationary Ergodic Semi-Markov Process of Order r.
In general, delay values are continuous values from 0 to ∞, (the value ∞ may be used to characterize a lost probe). In one procedure, link delay values are measured as discrete values, which are an integer number of bins with a bin width of q. The set of delay values is then
D={0, q, 2q, . . . , mq, ∞}, (Eqn 37)
={0, 1, 2, . . . , m, ∞} (Eqn 38)
The discrete time discrete state delay process at link k is then {Zk(i)} and Zk(i) ε .
An example, in which the parameter under test is delay, is illustrated in the flow chart shown in
In step 702, the probe index j is initialized to 1. In step 704, source root node 0304 multicasts probe j 316 to destination nodes node d 306-node g 312. In step 706, each individual destination node, node d 306-node g 312 collects data from probe j 316. In this instance, data comprises delay values computed from measured arrival times of probe j 316 at each individual destination node, node d 306-node g 312.
As discussed above, the data is collected in a database which may be programmed in source root node 0304, destination nodes node d 306-node g 312, or on a separate host which may communicate with root node 0304 and destination nodes node d 306-node g 312. In step 708, the probe index j is incremented by 1. In step 710, the process returns to step 704, and steps 704-708 are iterated until four probes have been multicast. The process then continues to step 712, in which the probe data is outputted. In step 714, temporal delay characteristics of packet data network 302 are inferred from the probe data outputted in step 712. Details of the inference process are discussed below.
An example of data outputted in step 712 is shown in table 712A, which comprises columns (col.) 716-724 and rows 726-734. In row E26, the column headings indicate probe index j col. 716 and destination nodes node d col. 718-node g col. 724. Column 716, rows 728-734, track the probes, probe j,j=1-4. The entries in rows 728-734, col. 718-724, track the delays between source root node 0304 and destination nodes node d 306-node g 312. In this example, the bin width q is set equal to 1, and the threshold value m is set equal to 150. For j=1, the delay times corresponding to destination nodes node d col. 718-node g col. 724, are, respectively, (1, 4, 6, 2). Similarly, for j=4, the delay times corresponding to destination nodes node d col. 718-node g col. 724, are, respectively, (20, ∞,∞, 150). Here, a value of ∞ indicates that the delay time was >150, and the probe was declared lost.
The delay measurement process at a node k is denoted
{Xk(i)): Xk(i)ε {0, 1, 2, . . ., m ∞}, (Eqn 39)
X
k(i)=Zk(i)+Xf(k)(i) (Eqn 40)
which states that the delay between root and node k is equal to the delay between root and f(k) and the incremental delay between f(k) and node k. The total delay from root to node k is then the sum of the delay processes over all the ancestor nodes of node k:
which states that if the delay from root to f(k) is the value q, then the probability that the delay from [root to node k]=p has three outcomes. If p<q, then the probability is obviously 0, otherwise the delay between f(k) and node k is negative (probe i arrives at node k before it arrives at f(k)). If q=∞, then the probability that p=∞ is obviously 1 since if probe i is lost at f(k) it continues to be lost at node k (probe i is not regenerated between f(k) and node k). Otherwise, the probability is the probability that the link delay process Zk(i) has the value (p−q).
As in the examples described above for a loss process, an embodiment for a delay process is applied to instances with the following dependence structure:
Packet delay on a specific network link is equal to the sum of a fixed delay and a variable delay. The fixed delay, for example, may be the minimum delay resulting from processing by network equipment (such as routers and switches) and transmission across physical links (such as fiber or metal cable). The minimum delay is characteristic of networks in which the traffic is low. As traffic increases, a variable delay is introduced. The variable delay, for example, may result from queues in buffers of routers and switches. It may also arise from re-routing of traffic during heavy congestion. In one process, delay is normalized by subtracting the fixed delay from the total delay. For example, for a specific link to a specific receiver, the fixed delay may be set equal to the minimum delay measured over a large number of samples at low traffic. If dmax is the maximum normalized delay measured over the set of receivers, then the threshold m for declaring a packet as lost, may for example, be set to
m=d
max
/q, where q is the bin width. (Eqn 43)
In general, a goal is to estimate the complete family of joint probabilities
Pr[Z
k(il)=d1, Zk(i2)=d2, . . . , Zk(is)=ds] (Eqn 44)
The mean run length is
In Eqn 46, μkH is the ratio of the expected proportion of time spent in runs in the subset H (per unit time index) divided by the expected number of transitions into H (per unit time index). The mean run length of a delay state may be derived if the simplest joint probabilities, with respect to that state may be estimated:
Eqn 45 may be used to partition the link states into two classes. States in subset H are referred to as “bad”. States in \H are referred to as “good”. For example, H may refer to states with a delay greater than a user-defined value d. In which case, μkH is the mean duration of runs in which the delay is at least d.
As in the procedure for estimating temporal loss characteristics, in an embodiment for estimating temporal delay characteristics, the source at the root node multicasts a stream of n probes, and each receiver records the end-to-end delay that it observes. The transmission of probes may then be viewed as an experiment with n trials. The outcome of the i-th trial is the set of discretized source-to-receiver delays
{Xk(i), k ε R}, Xk(i)ε {0, 1, . . . , m, ∞} (Eqn 47)
To calculate joint probabilities, the following values are defined herein.
I={i1, i2, . . . is}, as before I is a set of probe indexes, (Eqn 48)
not necessarily contiguous
k(I)=[Xk(i1), Xk(i2), . . . , Xk(is)] is a random vector (Eqn 49)
k(I)=[Zk(i1), Zk(i2), . . . , Zk(is)] is a random vector (Eqn 50)
, are delay vectors, and ≦ means dj≦vj for any j (Eqn 51)
=[m, m, . . . , m] (Eqn 52)
=[0, 0, . . . , 0] (Eqn 53)
Then, the joint link probability is
αk(I, )=Pr[k(I)=, for ,≧, (Eqn 54)
and the joint path passage probability is
After the values k(I, ), for all k ε U, for ≦≦, have been obtained, the following values are recursively deconvolved:
For the case where ≦ does not hold (that is, at least one element of is ∞), αk(I, ) is obtained using αk(I, ), ≦, recursively using the αk for smaller index sets. For example, for =[d1=∞, d2, . . . , ds], then αk(I, ) may be re-expressed as follows:
For k ε U, path probabilities (I, ), ≦≦, are estimated by using the principle of subtree partition as follows. Consider branch node k 604 in the tree T 600 (
where ε{0, 1}|k|. γk,j(I, ) is the probability that for each probe index il ε I, the minimum delay on any path from source S to receivers in Rk,j, does not exceed dl ε . On the other hand, βk,j(I, , ) is the probability that, for each probe index il ε I, the minimum delay on any path from node k 604 to receivers in Rk,j is either ≦dl or >dl ε depending on whether bl ε is 1 or 0. Let =[1, . . . ,1]. Then, , β, and γ are related by the following convolution:
In order to recover (I, )'s from the γk(I, )'s which are directly observable from receiver data, the following two properties of β's are used.
βk,j(I, )=βk,j(I′, , )−βk,j(I, [1, b2, . . . , bs])
which eliminates the 0 at il. The above can be applied recursively to eliminate all zeroes, resulting in terms of the form βk,j(I′, , ), I′ I, |I|−()≦|I′|≦|I|, where () denotes the number of zeroes in . In general
βk,j(I, , ≠)=(−1)z(B)βk,j(I, )+δk,j(I, ) (Eqn 64)
where δk,j(I, ) is the appropriate summation of βk,j's for index sets I′ c I. For example, if I={1, 2}, =[0, 1], =[d1, d2], then,
βk,j(I, )=−βk,j(I, )+βk,j({2}, [d2], )
Hence, δk,j(I, )=βk,j({2}, [d2], ).
By using Equation 64 in Equation 63, terms of the type j≠ can be removed, leaving only terms of type j=, giving:
Using Equation 65 and Equation 62, the desired path probabilities for node k 604, k(I, ), ≦≦, can be computed using the observables γk,j(I, ). The recovery of (I, ) from the above equations involves two levels of recursion: (i) over delay vectors, arising due to convolution, (ii) over index sets arising due to summation term involving δ in Equation 65. The δ(I, .,.) only contains terms involving I′ c I and therefore does not contain (I, .). Thus estimation can be performed recursively starting from I={i} when the summation term with δ vanishes and = when the convolution vanishes. Each step of recursion involves solving a quadratic equation in the unknown k.
The computation of (I, ) for pairs of consecutive probes i.e. I={1, 2}, proceeds as follows (I={1,2} is same as I={i+1}). Due to recursion over index sets, the case of I={1} is considered first.
γk,j(0)=k(0)βk,j(0)
βk,0(0)=1−(1−βk,1(0))(1−βk,2(0)) (Eqn 66)
from which k(0) is recovered by solving a linear equation as
Substituting back (0) gives the βk,j(0)'s for use in the next step. Assuming that and βk,j's have been computed ∀ v1<d1, (d1) is recovered using Equation 65 and Equation 62 as
The unknown terms are marked by a “*”. (d1) is recovered by solving a quadratic equation and substituting back (d1) gives βk,j(d1)'s.
{[v1, v2]: v1≦d1, v2≦d2}\{[d1, d2]},
(d1, d2) is recovered as follows. Equation 65 and Equation 62 are expanded.
The unknown terms are marked by a “*” and (d1, d2) is obtained by solving a quadratic equation.
The parameter γk,j(I, ) may be estimated using the empirical frequencies as:
The parameter γk,j(I, ) is then used to define an estimator (I, ) for (I, ). The parameter {circumflex over (α)}(I, ) is then recursively deconvolved.
The mean run length of delay state p ε is estimated using joint probabilities of single and two packet indices as
When delay states are classified into bad H and good G=H states, the mean run length of bad state is estimated using the joint probabilities of single and two packet indices as:
A similar expression is used to estimate {circumflex over (μ)}kG.
One embodiment of a network characterization system which performs multicast-based inference may be implemented using a computer. As shown in
The foregoing Detailed Description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention.
This application is related to U.S. patent application Ser. No. ______ (Attorney Docket No. 2006-A1155), entitled Multicast-Based Inference of Temporal Loss Characteristics in Packet Data Networks, which is being filed concurrently herewith and which is herein incorporated by reference in its entirety.