Research Article  Open Access
Muhammad Murtaza Yousaf, Michael Welzl, "On the Accurate Identification of Network Paths Having a Common Bottleneck", The Scientific World Journal, vol. 2013, Article ID 890578, 15 pages, 2013. https://doi.org/10.1155/2013/890578
On the Accurate Identification of Network Paths Having a Common Bottleneck
Abstract
We present a new mechanism for detecting shared bottlenecks between endtoend paths in a network. Our mechanism, which only needs oneway delays from endpoints as an input, is based on the wellknown linear algebraic approach: singular value decomposition (SVD). Clusters of flows which share a bottleneck are extracted from SVD results by applying an outlier detection method. Simulations with varying topologies and different network conditions show the high accuracy of our technique.
1. Introduction
Endtoend flows in packet based networks adversely influence each other when they traverse a network link which is a single point of congestion. We call such a link a “shared bottleneck”. Given the large number of distributed applications that are now used on the Internet, where coordination between such endtoend flows is quite feasible, we believe that the detection of shared bottlenecks in the network is one of the key measurement efforts that can be undertaken, as there are numerous possibilities for using such knowledge.
Consider, for example, a transfer delay prediction tool (which is a common element of computational Grids) which tells two senders A and B that the time to transfer files to receivers C and D will be four and five minutes, respectively, but fails to inform them that the AC and BD path share a bottleneck. Then, both systems would perhaps start to send the files at the same time, and the predicted transfer delay would clearly be wrong because of adverse interactions between the flows at the shared bottleneck. In a Grid, it is not uncommon for a single entity (or person) to be in control of the two senders A and B—thus, with knowledge about shared bottlenecks, this problem might have been prevented by accordingly scheduling the time of these transfers (this is what schedulers in Grid workflow systems do).
As an another example, one could imagine an overlay network where a file is sent from a single source to a single destination via multiple paths across the overlay in order to speed up the transfer time. Such a scheme would probably only yield a noticeable benefit if the overlay paths that are used do not include a shared bottleneck in the underlay. Similarly, in peertopeer systems, knowledge about shared bottlenecks could theoretically be used for appropriately rearranging the way documents are placed in order to exploit multiple paths or avoid adverse interactions among simultaneously active downloaders.
To the best of our knowledge, despite the existence of some measurement studies on shared bottleneck detection (cf. [1–3]), such endeavors are hardly undertaken. This may be due to problems with the existing measurement methods, such as the amount of data that they need to transfer, or the time that a measurement would take. Most notably, the accuracy exhibited in recent studies is limited—this may be a reason for designers of new network mechanisms to refrain from using such measurement results in practice.
In this paper, we address this issue with a method that only operates on endtoend measurements (forward delays), is easy to calculate, and provides extraordinarily accurate results. Our scheme is based on a combination of the wellknown technique of singular value decomposition (SVD) of principal component analysis (PCA) and outlier detection.
After a brief survey of related work in the next section, we will provide the mathematical foundations of our mechanism in Section 3. The mechanism itself will be explained in Section 4, and results from simulations will be presented in Section 5. Section 6 concludes with an outlook on future work.
2. Related Work
The awareness of the complete network topology and particularly the knowledge of congested network links which are shared by multiple flows can be of great use to many applications. A great deal of work has already been done in this area which directly or indirectly relates to our study. In what follows, we briefly discuss some of the related efforts.
Two techniques have been proposed in [1] which are mainly based on correlation: one is based on the forward delays of the packets and the other relies on packet loss. The decision of whether two flows share the same bottleneck or not is made by a comparison test. Such a test would compare the cross measure (crosscorrelation) and automeasure (autocorrelation), so the decision is not only taken on the basis of a single correlation function.
In the delay based technique, the cross measure is computed by merging the delay sequences of the two flows which are to be tested. From this merged sequence, only those pairs of samples are picked in which the first sample of a pair is from one sequence and the second sample of pair is from another sequence. Then, from all such samples, the cross measure is calculated between the samples of the first and the second sequence. The automeasure is calculated as the correlation coefficient between the delays of adjacent packets of a single flow. After the computation of the cross measure and the automeasure, the comparison test declares that the two paths share a bottleneck if the automeasure is less than the cross measure.
In the loss based technique, the cross measure and the automeasure are actually the conditional probabilities that a packet is lost given that the following packet is also lost. Both techniques work in the topologies where the senders or receivers are colocated. It is also shown that the delay based technique attains accuracy quite quickly as compared to the loss based technique.
The entropy based technique presented in [4] works in topologies where some sources are connected to a single destination with the assumption that each path holds only one bottleneck. Passive measurements are used in this technique to measure the interarrival times at the destination. A cluster of flows is formed and the average entropy is calculated for every flow with the assumption that the flow belongs to this cluster. After that the flow is put into the cluster with the minimum average entropy. The clustering correctness of this technique only gives acceptable results in case of low cross traffic and does not scale well with heavy cross traffic.
We consider FlowMate [3] as one of the most relevant works for us. It uses the comparison test for the delay based technique of [1] and works on the online clustering of flows by comparing each new flow with a representative flow of every cluster. Initially, one flow is designated in each cluster and later every new flow is compared with only one representative of each cluster. Another simple clustering mechanism is also discussed in [3] where representatives of each cluster can be switched dynamically. The accuracy of FlowMate, however, becomes a problem in case of short lived HTTP connections because it does not get enough samples.
One of the latest works in this regard is by Kim et al. [5], where a clustering approach which uses multidimensional indexing is presented. This work is based on the previous work presented in [2], where the crosscorrelation was used to detect whether two paths share a bottleneck. This crosscorrelation is computed between the delay sequences of two paths after applying wavelet denoising on the original delay sequences.
One thing which is common in all the abovementioned approaches is that all of them operate in a pairwise fashion. All techniques consider two paths to detect if flows share a bottleneck whereas our mechanism works for any number of flows at the same time, resulting in clusters of paths which share a bottleneck.
A loss based technique which expects a common sender to send packet pairs has also been proposed [6]. If the probability of the second packet being lost exceeds a particular threshold, it is assumed that the two paths share a point of congestion. This technique requires DropTail queuing and can suffer from all the problems which exist for packet pair based measurements.
3. Multivariate Analysis
Multivariate analysis has most of its applications in image processing and pattern recognition, but the nature of our problem makes multivariate analysis an ideal tool in solving it. We decided to apply multivariate analysis because we believe that there are many factors which are beyond the scope of a simple correlation method. Multivariate analysis is highly suitable in such scenarios because we want to check the principal factors which mean the delays caused by the congested link.
We will see that SVD provides us with highly accurate results in terms of identifying the flows which share a bottleneck. SVD is one out of many multivariate analysis techniques in the literature, and others should eventually also be considered in terms of efficiency and reliability.
We construct a matrix in which the rows are the flows and the columns are time slots. An entry in is the amount of (average) delay measured during experiments. We will analyze this data matrix using SVD.
3.1. SVD and Spectral Analysis
We briefly review the singular value decomposition of matrices; we will use some of its properties in our discussion in Section 4.2.
Any matrix can be expressed as where is the rank of , are its singular values, and , , are its left and right singular vectors, respectively. The ’s and ’s are orthonormal sets of vectors; namely, is one if and zero otherwise. We also remind the reader that In matrix notation, SVD is defined as where and are orthogonal (thus and ) matrices of dimensions and , respectively, containing the left and right singular vectors of . is an diagonal matrix containing the singular values of .
One of numerous applications of SVD is in recovering the structure of matrices and in noise removal in a variety of settings. The underlying idea is very simple: since , we can create approximations to by keeping only the top “principal components” (i.e., the top ) for various values of . Essentially, discarding the “smallest” principal components (the ones corresponding to the smallest singular values) results in a small loss in accuracy, and we might justifiably consider those components as “noise”. This procedure is commonly referred to as “principal component analysis,” and the following theorem (usually attributed to Golub and Loan [7]) quantifies the loss of accuracy incurred by keeping only the top components for various values of .
Theorem 1. Let (for any ). is the “best” approximation to with respect to the 2norm and the Frobenius norm; namely, for any matrix of at most , Also, We say that a matrix has a “good” approximation if the 2norm and the Frobenius norm of are small; for a detailed treatment of singular value decomposition, see [7].
3.2. Intuition
The main intuition behind using SVD based approach was obtained from the work of Camtepe et al. [8] where the authors used SVD based approach to discover hidden communities and communication patterns in a chatroom. A tool was built for the data collection of individual chatters, and then an SVD based algorithm was applied to locate groups of chatters communicating with each other. The authors used the number of messages exchanged during a time window as data and found the groups of chatters communicating with each other on the basis of a similar number of messages exchanged. We mapped this to our problem by comparing different nodes in the network with the chatters in the chatroom and considering forward delays along a path as data entries during a time window, assuming that this should provide us with an association among the paths with similar delay patterns during certain periods of time. As the endtoend delay along a network path is mainly influenced by the bottleneck, we assumed that SVD must cluster the paths with similar delay patterns during a certain period of time or, in other words, that share the same bottleneck.
4. SVD Based Shared Bottleneck Detection
A bottleneck is a network link/router where the packets of a flow experience excessive delays or they are even lost. Most of the techniques proposed till now to detect shared bottlenecks are based on packet delays or packet loss. It has been shown that delay based techniques quickly converge towards accurate results [1]; hence, we decided to rely on the same metric in our mechanism, where oneway delays along a path are used to detect shared bottlenecks. The whole approach is summarized in Algorithm 1. We can divide it into three major steps:(1)measurement of oneway delays along all the paths and obtaining a covariance matrix,(2)applying SVD on the covariance matrix and getting a projection,(3)grouping paths that share a bottleneck.

4.1. Delay Measurements
First of all we measure the oneway delays for all the paths by initiating a flow on every path. We group samples of delay measurements on the basis of time windows and pick the average of a time window as a representative delay measurement for that particular time window. We have worked with different time windows and observed no significant change in our results; this is explained in Section 5.2. After checking with different window sizes, we decided to use 0.3 seconds as an optimal value for realistic network conditions.
Clearly, this value is a tradeoff between accuracy (the smaller the window, the more information we have) and overhead (we need to collect the necessary data at the network node that will carry out the calculation). We can also reduce or expand the time window size depending on the delay samples available; for instance, in case of short lived flows, we can reduce it, and, in case of long lasting flows, we can expand it, for example, if we need to work in a fully passive environment. At the end we form a matrix of forward delays of all flows as shown in (5) where each row represents the delays experienced by a single flow. Each entry is an average delay measurement of the th path for the th time window: The variability of the delays experienced by all flows can be summarized by computing the covariance matrix of the delay matrix . Given an delay matrix , whose rows represent different paths and whose columns have average delay measurements, the covariance matrix of is the matrix which has entries as defined in (6): In short, is the covariance of delay measurements of the th and th path in the delay matrix. The covariance of two sets of data is a measure of how strongly they vary together. When , then the covariance is the variance of the delay measurements of a path.
Here, it is important to note that, if clocks are not synchronized between sender and receiver, then all the delay measurements will be shifted by a certain amount. The shifting will not affect the result of SVD based approach because the important factor for the result is the delay pattern and not the magnitude of actual delays, so the lack of time synchronization will only cause a shift in actual delay values, but the delay pattern will still be preserved.
4.2. Applying SVD and Projecting
Having the covariance matrix of delay measurements, we apply SVD on to get singular values of our delay measurements for all the paths. As a result we get the left singular matrix , the diagonal matrix , and the right singular matrix . Here, the matrix represents the association among the paths on the basis of similar delays caused by common bottlenecks, and the matrix represents the degree of this association. Then, on the basis of rank reduction of the diagonal matrix , we project the matrix on the column(s) ( of the diagonal matrix to look for dimensions. The value of can be decided by looking at the explained variance of the elements of the diagonal matrix. For instance, if the first element of the diagonal matrix is explaining the data 60%, then we may need to take the second or third dimensions. If the first one explains 90% of the data, we say there is rank reduction and project on the first column of the diagonal matrix to take only the first dimension.
Usually, if the paths under investigation share a bottleneck, then the diagonal matrix always shows a good rank reduction and we need to project only on the first column of diagonal matrix. In order to project matrix on the th column of the diagonal matrix, we multiply each row of with only the th column of the diagonal matrix. This results in a matrix , as shown in (7), that has one entry corresponding to each path, and these values are further used to group flows on the basis of shared bottlenecks:
4.3. Grouping Flows
As already stated, the matrix contains one value for each path. Here, the values for paths that share a bottleneck are similar, and they differ significantly from the values of other paths. A simple plot of such values will look as in Figure 1(a). If we sort all the entries of matrix in a descending order and plot the sorted data, then even at this step we can easily visualize some clusters as exhibited for the same data in Figure 1(b), which shows our result of one of the experiments with paths and 3 bottlenecks. If we visualize the data as a graph, we can observe some clear grouping on the basis of stable slopes and sudden drops in the slope indicating the start of a new cluster.
(a) Projection values
(b) Sorted projection values
(c) Rate of change
We find the rate of change (roc) between two successive values of the sorted list by using The rate of change could be calculated by dividing the successive differences with the denominator being either or . As the values have already been sorted in a descending order, it is obvious that this series exposes the break points better if we choose as a denominator as compared to which is shown in Figure 1(c). Once we have this series of rate of change, the next step is to detect the break points which becomes a simple problem of detecting outliers.
In order to detect outliers, we used the threshold defined as where is the mean rate of change and is its standard deviation. The coefficient value of 0.2 was selected after a detailed study of data obtained in simulations. As we will see in Section 5, our method works very well with this value in a wide range of network conditions and scenarios.
4.4. Time Complexity of the Whole Algorithm
It is important to have a computable time complexity for situations where a mechanism needs to be applied in real time. In this section, we discuss the time complexity of our algorithm and we show that it is feasible to use online. It has three major parts. During the first part, we extract singular values from delay measurements, then in the second phase we find the projection of left singular vectors over the first singular value, and finally in the third and last phase we identify clusters of paths that share a bottleneck.
First of all let us discuss the time complexity of SVD which is for a matrix of order [7]. Here, the dominant part is the number of columns of a matrix. In our technique, the number of columns or is the number of delay measurements used to detect shared bottlenecks. In Section 5, we will show that very few measurements (1 measurement is the average of all samples taken in 300 milliseconds) are enough to obtain an accurate result. The time complexity of is not expensive at all when we have an upper bound on , so if we consider as a constant, then the complexity becomes , which means that it depends only on the number of paths under investigation. It is also true if covariance matrix is used instead of simple delay measurement matrix.
In an online version, we may need to update our results in a continuous fashion because the bottleneck link may vary depending on the load of network traffic. Solving SVD for one matrix of delay measurements allows for an incremental, efficient solution for letting the matrix slide over in time (i.e., throwing away the oldest measurements and bringing in the most recent). In such situations, the time complexity of SVD is further reduced to [9] where is the size of the data set.
The second phase involves the projection which mainly multiplies the first element of each row of matrix with the first element of the first column of matrix . This procedure takes multiplications which means a time complexity of .
We get values corresponding to each path as a result of second stage. In the final part of our procedure, we first sort these values, which may take steps (e.g., if quicksort is used). At the end, for grouping paths which share a common bottleneck, we need to compare the sorted list with a threshold. This can be done in steps because it just involves comparisons. We perform all above steps in serial so the most dominant part defines the time complexity of our whole algorithm. The total time complexity is, therefore, where is the number of paths to be inspected for common bottlenecks. This shows that it is practical to use this approach in real time.
5. Performance Evaluation
In this section, we present the results of using our mechanism in simulations. We used the ns2 [10] network simulator to examine different scenarios. We have applied the same simulation topologies and parameters which were investigated in [3] because we consider it as one of the most relevant works to us. One of the two topologies used in [3] is simple and symmetric, while the other one is more complex and asymmetric. As in both topologies the link delays after bottlenecks are similar, a delay matrix was used to obtain SVD results for all experiments. The only exceptions are the experiments discussed in Section 5.2(8), where a topology is used which has longer delays at some branches after the bottlenecks. There, it will be shown that the use of the delay matrix for SVD shows its limitations in such situations, and hence the appropriate choice is the covariance matrix which could be used in all cases.
The symmetric topology is shown in Figure 2(a). It contains three different bottlenecks on three different branches of paths. Each branch has three different destinations for a common source. All the links capacities are 10 Mbps except for the bottleneck links of the first two branches. The bottleneck links at the first two branches have a capacity of 1.5 Mbps and 3.0 Mbps, respectively, whereas the third bottleneck is created by heavy cross traffic from a number of constant bit rate (CBR) flows. Background traffic is generated in both directions from source to destinations by a number of multiplexed Pareto flows. The rest of the simulation parameters are summarized in Table 1.

(a) Symmetric topology
(b) Asymmetric topology
The asymmetric topology is shown in Figure 2(b). It also has three different branches with a bottleneck at each branch. The mechanism for creating the bottlenecks is the same as for the symmetric topology. It has a varying number of destinations, and, for each destination, it has a varying number of links for the endtoend path. Simulation parameters are given in Table 1 except for the number of foreground TCP flows which is 12–36.
5.1. Performance Metrics
Three different performance metrics which can be considered for measuring the accuracy have been used in [2] as follows.
(i) False Positive: a flow does not share a bottleneck, but it is considered as being part of a group that shares a bottleneck.
(ii) False Negative: a flow shares a bottleneck with a group but is not identified as part of the group.
(iii) Correct Clustering: a flow is in the same group as flows with which it shares a bottleneck.
The accuracy index (AI) presented in [3] takes all of the above performance metrics into account and measures the accuracy of clustering in a unified manner. If there are paths, is the set of correct clusters, is the set of clusters as a result, is the number of flows erroneously included in a resulting cluster, and is the number of subclusters of a correct cluster that was split into subclusters in , then AI is calculated as
5.2. Results
In this section, we discuss the results of our experiments in different ways to highlight the accuracy of our SVDbased method for detecting shared bottlenecks.
(1) Symmetric Topology. To illustrate our whole mechanism, we first used the symmetric topology shown in Figure 2(a) with 9 TCP flows (one for each destination). In this experiment, flows 1–3, 4–6, and 7–9 each share a bottleneck. For better understanding, in the first row of Table 2, we show the values of the diagonal matrix which exhibits a nice rank reduction, whereas in the second row the values of matrix are shown; these are the results after projection of the left singular matrix on the first component of the diagonal matrix (as explained in Section 4.2). Just from a brief look at the values of in Table 2, we can visualize a grouping of flows 1–3, 4–6, and 7–9.

As the next and final step, we calculate the rate of change for the values of matrix as explained in Section 4.3 and find the outliers to detect the group of flows which share a bottleneck. The results are shown together with the absolute values of in Figure 3(a); they are accurate according to the simulation scenario.
(a) 9 flows
(b) 18 flows
(c) 27 flows
We conducted the same experiment with 18 and 27 foreground TCP flows to check the effect of multiple TCP flows over the same bottleneck. In these experiments we started 2 and 3 TCP flows for the same destination, using a random start time within the first second of the simulation in order to minimize phase effects [11]. In both experiments, we obtained accurate shared bottleneck recognition (i.e., ). The results are depicted in Figure 3.
(2) Asymmetric Topology. We performed experiments with 12, 24, and 36 flows with random start time within the first second of the simulation using the asymmetric topology and found to be always 1. The results are shown in Figure 4.
(a) 12 flows
(b) 24 flows
(c) 36 flows
(3) Window Size. We used the asymmetric topology with 12 foreground TCP flows (representing 12 paths). In this experiment, we wanted to check the impact of the window size on the accuracy of our method. By window size we mean the time interval for which we combine all delay measurements and choose one representative which is the average of that interval. A window size of 0.3 seconds is working fine, in what follows; we justify the use of this value. We ran the simulation for 60 seconds and obtained results after setting different window sizes. It is possible that, if we keep on reducing the size of the window, we will reach a point when some windows may not have even a single measurement due to congestion, meaning we will not have even a single delay measurement for that particular window. This must be avoided because the SVD may result in inaccurate results if we use some blanks or imaginary values in the matrix of delay measurements. At the same time, we should not make the window size too large because this could blur the information about the correct bottleneck, and the time series of delay measurements of different flows may not show any association.
During this experiment we varied the window size from 0.1 seconds to 1.0 seconds, increasing it by 0.1 seconds. The resulting accuracy index was 1 after a window size of 0.2 onwards, as shown in Figure 6(a). Figure 6(b) shows very stable slopes with significant rate of change (roc) for projected values for all the windows sizes we investigated. This makes it much easier to identify cluster of flows that share a bottleneck.
As already mentioned, we started from a very small window size of 0.1. In this case, there were many windows for which we could not have even a single delay measurement. We placed −1 in the empty windows because SVD does not work with empty cells in the matrix. We show the percentage of negative values (i.e., empty windows) against the window size in Figure 6(c). We notice that the percentage of empty cells for a window size of 0.2 is , but even then we got accurate results as depicted in Figure 6(a). This means that our method is strong enough to cope with some percentage of missing data less than or equal to .
On the basis of the above observations we propose a general principle to choose a window size for any environment such that it may not yield a percentage of empty cells of more than . In the rest of our experiments, we used a window size of 0.3 which worked fine with all the dynamic network conditions and environments that we simulated. Another strength of our approach revealed in the above experiments was the amount of data required to converge to accurate results. By increasing the window size to 30 seconds we had only 2 average measurements per flow. In such situation, we had a delay matrix of and it resulted in only 2 values in the diagonal matrix , but even with such a small number of values in the diagonal matrix we had perfect results after the projection step.
(4) Drop Policy. We observed some interesting results in simulations using the asymmetric topology with different drop policies like RED and DropTail. DropTail performed well and showed a very promising behavior as shown in Figure 4. However in the case of random early detection (RED), while adopting our usual procedure, we found a small margin of inaccuracy. This inaccuracy occurred because we could not reach the desired rank reduction in the result of SVD. Thus, we projected our data on 2nd and 3rd components, and consequently the results became more accurate as shown in Figure 5.
(a) Projection on 1st component
(b) Projection on 2nd component
(c) Projection on 3rd component
(a) Accuracy index
(b) Projected values
(c) Percentage of empty cells
It is not surprising that our mechanism has problems with RED, which improves fairness and reduces phase effects by randomly dropping packets [12]—any technique that tries to detect dependencies between flows will naturally suffer from a mechanism that is designed to work against these dependencies. Nevertheless, some dependencies may still remain; thus, although DropTail is commonly known to be the most common drop policy used in routers, we feel that we should work on the automatization of our mechanism to work with all possible drop policies by introducing some additional decision making during the projection phase. This is planned as future work.
(5) Buffer Size. Our additional tests included scenarios with different buffer sizes from 50 to 500 packets. The results showed no significant difference. With DropTail, the AI was always 1. We also computed the AI after every 5 seconds for all above scenarios, starting from second 1 of the simulation till its end. We found that the value was 1 throughout the simulations.
(6) Without Common Endpoints. In our experiments so far, we have used topologies with a common source. It has also been the major assumption in related work to have a single common source or destination. Here, we evaluate our technique for scenarios with multiple sources and destinations. The topology used for these experiments is shown in Figure 7. We have created it by considering the mirror image of all three branches of the asymmetric topology shown in Figure 2(b). The center of the topology represents an overprovisioned widearea network backbone, whereas bottlenecks are placed at the access points of local networks, which resembles the most common reallife case of Internet connectivity. Two of the three bottlenecks are limited because of their small physical capacity (1.5 Mbps and 3.0 Mbps, resp.) whereas the third bottleneck is caused by heavy cross traffic. The parameters and details for cross traffic and background (forward and reverse) traffic are the same as with previous topologies—these parameters are mentioned in Table 1 except for the nonbottleneck link capacities which were 100 Mbps for this topology.
In our first experiment we generated 12 TCP flows, one from each source to the corresponding destination in the mirror. We take it as a basic step to show the accuracy of our mechanism which does not need any synchronization between the sending time of senders and does not require packets of different flows to be adjacent, which was required in related work. We randomly start all the flows during the first second of the simulation. After gathering the delay measurements, applying SVD, and then detecting the outliers to form the groups of flows which share a bottleneck, we found the accuracy index (AI) to always be 1. This is also shown in Figure 8(a) which indicates that the first three flows, next five flows, and last four flows share a bottleneck.
(a) 12 Flows with corresponding sources and destinations
(b) 12 Flows with random sources and destinations
(c) 36 Flows with each sender sending 3 flows to random destinations in each bottlenecked branch
As a next step, we again generated 12 TCP flows but from random sources to random destinations; again, our SVD based mechanism resulted in a very nice rank reduction and then clearly showed the outliers to form the group of flows which share a bottleneck. The results are shown in Figure 8(b).
As a final step, we generated three TCP flows from every sender to a randomly selected destination in each branch of the bottleneck. In this way, we generated 36 flows in total, generating foreground traffic from each sender to every branch of the bottleneck. Even with such a heavy foreground and background traffic our mechanism was stable and reliable enough to produce clusters of flows having common bottlenecks with an of 1, which is shown in Figure 8(c).
(7) Fluctuating Bottlenecks. It is quite possible in real networks that heavy cross traffic may cause a link to behave as a bottleneck for an endtoend path for a while, and then a routing change or some sudden bursts may cause another link to become the bottleneck. Therefore, in our next experiments, we evaluated the adaptability of our mechanism in case of fluctuating bottlenecks.
The topology used for these experiments is depicted in Figure 9. All the links have a capacity of 10 Mbps, the queue length is 250 packets, and the packet drop policy is DropTail. We generated three TCP flows as foreground flows from senders s1, s2, and s3 to the destinations d1, d2, and d3, respectively, giving us three distinct endtoend paths p1, p2, and p3. The link between r1 and r2 as well as the link between r2 and r3 may become bottlenecks. If the link between r1 and r2 is behaving as a bottleneck, then the paths p1 and p2 will share a bottleneck; if the link between r2 and r3 is congested, then the paths p1 and p3 will share a bottleneck. Hence, the bottleneck on path p1 may fluctuate from one link to another. We congest the links between r1, r2, and r3 by using a number of CBR flows. In addition to foreground TCP flows and CBR flows as cross traffic, we also started some Pareto flows as background traffic. These Pareto flows are originated from all sources and destinations (including nodes n1 and n2) in both forward and reverse directions. The flows in forward direction were initiated with a constant bit rate of 256 Kbps whereas the flows in reverse direction were sent at a rate of 64 Kbps. The average ON and OFF times were set to 500 ms and the Pareto shape parameter was set to 1.5.
In our simulation of 30 seconds we congested the first link for the first 12 seconds of the simulation and then shifted the heavy cross traffic to the second link. As a result, for the first 12 seconds, paths p1 and p2 shared a bottleneck, and, for the rest of the simulation, paths p1 and p3 shared a bottleneck. Initially we calculated the for every 3 seconds and found that it accurately detected the bottleneck shift around the 12th second of the simulation. Then, in order to check the adaptability of our mechanism at a fine grained level, we also calculated the for every 1.5 seconds from the 9th second of the simulation till the 15th second of the simulation because this was the time when the bottleneck shifted. This time we noticed a drop in the (suggesting an inaccurate clustering) around the 12th second, as shown in Figure 10.
From this experiment we came to know that our mechanism was efficient enough to adopt the shift in the bottleneck within 3 seconds, which is quite acceptable because, if the bottleneck fluctuates every time within less than 3 seconds, then this information will probably not be very useful.
(8) Topology with Longer Delays after the Bottleneck. This section highlights a problem that occurs if the delay matrix is used as an input for the shared bottleneck detection algorithm. This problem is not very common but may occur in some special scenarios—this is evident from all the experiments presented so far, where the delay matrix was used as an input for the shared bottleneck detection algorithm and no problem was visible in the results. A scenario where such problem might occur is depicted in Figure 11. In this topology, links from r3 to D2 and from r4 to D4 have delays 100 ms and 120 ms, respectively. These delays make one path after each bottleneck much longer than others in the same branch. All other simulation parameters regarding foreground and background traffic are the same as the ones used in previous experiments.
Due to this setup, when forward delays are measured from the source to all destinations, then delays from the source to D2 and D4 become similar in terms of their magnitude. These magnitudes overlap so closely that this overlapping outweighs their delay patterns. This can be observed from the projection results presented in Table 3. When the delay matrix was used for shared bottleneck detection, the projection results put path source D4 in first cluster because the forward delay values for this path were highly overlapping with the path source D2. In order to resolve this issue, the covariance matrix is used for shared bottleneck detection. Then, it can be observed from the projection values presented in Table 3 that both clusters were accurately found.

5.3. Comparison with FlowMate
We compared our mechanism with FlowMate which, to the best of our knowledge, is the best of the mechanisms in terms of accuracy and computational complexity.
(1) Asymmetric Topology. We used the asymmetric topology illustrated in Figure 2(b) for the comparison. We used 256 Kbps Pareto flows as background traffic from the source to all destinations and 64 Kbps Pareto flows as background traffic in the reverse direction from all destinations to the source. All flows started randomly during the initial phase of the simulation. We used TCP flows as foreground traffic from the source to all destinations to measure the forward delays for all paths during the whole period of simulation, and these TCP flows were also started randomly during the first second of the simulation. As the FlowMate and our SVD based method both require forward delays along the paths for shared bottleneck detection, we used the same data for both methods. We applied the FlowMate algorithm and our SVD based mechanism after every 10 seconds to cluster the flows with shared bottlenecks and calculated the . Our mechanism always produced accurate results whereas the results produced by FlowMate were fluctuating under the accuracy line as shown in Figure 12(a). Most of the time the performance of FlowMate was degraded by false splitting; that is, a correct cluster was split into further clusters, and in a few occasions false sharing was also observed. This is shown in Table 4.

(a) With symmetric topology
(b) With asymmetric topology and accumulated data
(2) FlowMate with Cumulative Data. We used the setup from Section 5.3 to evaluate and compare FlowMate in a different manner. We decided to apply both mechanisms on accumulated data. The FlowMate is very selective in terms of picking samples to apply the correlation test as it needs adjacent packets for the cross measure , and for the automeasure it needs packets separated by a certain value . So the main reason behind this experiment was to observe and compare the performance of FlowMate when it has more than the sufficient amount of data. Our SVD based mechanism was already proven to be good enough to provide accurate results with a small amount of data, and this experiment also showed that our SVD based mechanism can perform well even with a smaller amount of data. We calculated after every 10 seconds of the simulation time after applying both mechanisms on accumulated data. FlowMate performed better than before and resulted in improved results as shown in Figure 12(b), but it still could not reach the accuracy level. Another thing observed in this experiment was the nature of errors committed by FlowMate: for accumulated data the errors were only due to false splitting and we did not observe any false sharing.
6. Conclusion and Future Work
In this paper we introduced a novel method for detecting shared bottlenecks in the network. By using SVD and applying a scheme for outlier detection on its output, we managed to obtain a perfectly accurate result in almost all of our simulations. The only exceptions from this rule are the obvious case of RED (which works against our mechanism) and the simulation of varying bottlenecks, where we deliberately tried to find the limit of our mechanism’s ability to adapt to dynamic network conditions. In the RED simulations, we were able to enhance the precision by projecting the diagonal matrix over second column of the left singular matrix.
Clearly, this high reliability is the main strength of our mechanism. We believe that, combined with its operational simplicity, we may have reached a turning point with our scheme where shared bottleneck detection may no longer be a mere measurement exercise but can in fact become a key practical element of future network or transport layer mechanisms. In addition to extending the performance evaluation of our mechanism with reallife measurements, we intend to contribute to this change in several ways in our future work, where we will embed our shared bottleneck detection method in the transfer delay prediction system that was briefly mentioned in the introduction as an immediate next step.
Acknowledgments
The authors would like to thank Marek Wieczorek, Yehia El Khatib, and Werner Heisz for their contributions.
References
 D. Rubenstein, J. Kurose, and D. Towsley, “Detecting shared congestion of flows via endtoend measurement,” IEEE/ACM Transactions on Networking, vol. 10, no. 3, pp. 381–395, 2002. View at: Publisher Site  Google Scholar
 M. S. Kim, T. Kim, Y. Shin, S. S. Lam, and E. J. Powers, “Awaveletbased approach to detect shared congestion,” in Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2004. View at: Google Scholar
 O. Younis and S. Fahmy, “FlowMate: scalable online flow clustering,” IEEE/ACM Transactions on Networking, vol. 13, no. 2, pp. 288–301, 2005. View at: Publisher Site  Google Scholar
 D. Katabi, I. Bazzi, and X. Yang, “A passive approach for detectingshared bottlenecks,” in Proceedings of the 10th IEEE International Conference on Computer Communications and Networks, October 2001. View at: Google Scholar
 M. S. Kim, T. Kim, Y. Shin, S. S. Lam, and E. J. Powers, “Scalable clustering of Internet paths by shared congestion,” in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006. View at: Publisher Site  Google Scholar
 K. Harfoush, A. Bestavros, and J. Byers, “Robust identification of shared losses using endtoend unicast probes,” in Proceedings of the 8th IEEE International Conference on Network Protocols, pp. 22–33, November 2000. View at: Google Scholar
 G. Golub and F. V. Loan, Matrix Computations, Johns Hopkins University Press, Baltimore, Md, USA, 1984.
 S. Camtepe, M. Krishnamoorthy, and B. Yener, “A tool for internet chatroomsurveillance,” in Intelligence and Security Informatics (ISI '04), pp. 252–265, 2004. View at: Google Scholar
 S. Chandrasekaran, B. S. Manjunath, Y. F. Wang, J. Winkeler, and H. Zhang, “An eigenspace update algorithm for image analysis,” Graphical Models and Image Processing, vol. 59, no. 5, pp. 321–332, 1997. View at: Google Scholar
 Network Simulator, http://www.isi.edu/nsnam/ns/.
 S. Floyd and V. Jacobson, “Traffic phase effects in packetswitched gateways,” ACM SIGCOMM Computer Communication Review, vol. 21, no. 2, pp. 26–42, 1991. View at: Publisher Site  Google Scholar
 S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397–413, 1993. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2013 Muhammad Murtaza Yousaf and Michael Welzl. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.