• 沒有找到結果。

Internet Exchange Traffic Sharing and Market Competition

N/A
N/A
Protected

Academic year: 2021

Share "Internet Exchange Traffic Sharing and Market Competition"

Copied!
6
0
0

加載中.... (立即查看全文)

全文

(1)

Internet Exchange Traffic Sharing and Market Competition

මᏦ໢

໳യ໢

ࠬ୯፵

୯ҥҬ೯εᏢၗૻࣽᏢس ୯ҥࡹݯεᏢၗૻᆅ౛س ୯ҥࡹݯεᏢၗૻᆅ౛س

tseng@cis.nctu.edu.tw

huangk@alum.sinica.edu chi@mis.nccu.edu.tw

ᄔा

εࠠᆛၡϐၗ਑໺ᒡՉࣁёຎࣁ΋ঁፄᚇޑ ߚጕ܄س಍ǶЀځࢂӧεࠠᆛၡύඔॊߏය܄ޑၗ ਑໺ᒡՉࣁ׳ࢂόܰǶаᆛሞᆛၡԶقǴךॺёа ஒᆛሞᆛၡᙁౣ୔ϩࣁᆛၡ୍ܺٮᔈ୘(ISP)Ϸᆛ ၡҬඤٮᔈ୘(IX)Ƕᆛၡ୍ܺٮᔈ୘ᆶᆛၡҬඤٮ ᔈ୘җܭѱ൑ᝡݾޑ่݀Ǵᆛၡ٬Ҕޣ(Users)ӧᒧ Ҕᆛၡ୍ܺਔஒགڙόӕำࡋޑᆛၡ୍ܺࠔ፦ (QoS)Ǵ೭٤όӕޑᆛၡ୍ܺࠔ፦ޔௗቹៜᆛၡ٬Ҕ ޣ௦Ҕ୍ܺޑཀᜫ, ӕਔΨቹៜΑ᏾ᡏᆛၡޑၗ਑ ໺ᒡՉࣁǶ ҁЎϩ݋ӧᆛၡҬඤٮᔈ୘(IX)ޑᕉნύၗ਑ ໺ᒡኳԄǶҁЎӕਔኳᔕᆛၡ୍ܺٮᔈ୘(ISP)Ϸᆛ ၡҬඤٮᔈ୘(IX)ӧѱ൑ᝡݾރݩΠόӕำࡋޑၗ ਑໺ᒡኳԄǶҗܭႝߞѱ൑໒ܫރݩΠǴᆛၡҬඤ ٮᔈ୘ޑѱ൑՞Ԗ౗ஒ೴ᅌ೏ีញǶҁЎ჋၂ӧӚ ᅿόӕޑᝡݾᕉნύǴගٮ࣬ჹᔈޑၡҗ฼ౣ (Routing Strategy)ٰӢᔈόӕޑѱ൑ᝡݾރݩǶ

ᜢᗖຒǺISP, IX, QoS, Routing StrategyǶ

Abstract

Traffic behavior in a large-scale network can be viewed as a complex non-linear system. It is very difficult to illustrate the long-term network traffic behavior in a large-scale network. The Internet can be seen as the combination of Internet Service Providers (ISP) and Internet Exchange (IX) providers. Due to market competition among ISPs and IX, Internet users will experience the different kind of quality of services (QoS), which effectively affect the network traffic model.

The paper analyzes the traffic model in the Internet Exchange (IX) environment. The model simulates ISP/IX market competition behavior. Internet exchange providers’ market share will be diluted

through market competition. Several routing strategy was proposed in the study. The routing strategies vary with the different competing environment.

Keyword : ISP, IX, QoS, Routing Strategy.

1.

Introduction

The Internet has been around for over decades now. Though it has become one of the most popular media, our understanding of it is still not yet complete. From topology point of view, the Internet can be seen as the combination of ISPs (Internet Service Providers) and IX (Internet Exchange). ISP provides Internet traffic access and transit to Internet users, IX provides traffic aggregation and exchange. One of the major areas in which we lack understanding of is Internet traffic behavior in IX environment. We address this issue by presenting a paper which models the traffic model in IX environment. In the paper we analyze and present a evaluation appraisal of the model.

Fig 1 illustrates the components of Internet architecture.

Fig 1. ISP vs. IX : Components of Internet Architecture ISP ISP ISP ISP ISP ISP IX IX

(2)

The connectivities among ISPs are constructed through either private peering or public peering (IX). Internet traffic engineering is defined as that aspect of Internet network engineering dealing with the issue of performance evaluation and performance optimization of operational IP networks. Traffic Engineering encompasses the application of technology and scientific principles to the measurement, characterization, modeling, and control of Internet traffic [1].

Introduce ISP operation model in IX environment. It is shown that smaller Internet exchange competitors can benefit from the competition even if their Quality of Service (QoS) is worse than the incumbent IX provider.

2.

A model of Internet traffic exchange

With reference to the case of two IX providers, we establish the following hypothesis to model the behavior of the ISP and the sharing of its traffic between the two IX providers.

 Initial assumption : there are only two IX providers in the market

 The ISP initially chooses one of the two IX providers (indicated as E1 and E2) with

probability p and 1-p (initial shares) respectively;

 The probably p can take into account all the factors that may lead the ISP to choose one of the two IX providers as its first choice, including the quality of service it offers or business settlement;

 Once the traffic congested, ISP has two choices: it can either switch to transit service provider (TSP) with higher transit cost (with probability pT ) or switch to the other IX for a

new attempt;

 Switching between the two IX providers is performed on a route-by-route basis and depends just on the latest route attempt;

 During the repeated routing attempt process, the congestion probabilities C1 and C2 (i.e. the

congestion probabilities that the route attempt through the operator E1 or E2), and the

probability of switching transit service provider pT stay constant.

 Congestion probabilities C1 and C2 can be

decomposed into other sub-elements, such as pricing and bandwidth. The decomposition analysis is not covered in this study.

Under these hypotheses the ISP’s behavior can be modeled by a four-state discrete-time Markov chain (see Fig. 2) in which state E1 corresponds to the ISP

attempting to route traffic through the operator E1,

state E2 corresponds to the ISP attempting to route

traffic through the operator E2, state Z corresponds to

a successful route to destination ISP, and state T corresponds to the ISP leaving the process (internet traffic through transit service provider). Both states Z and T are absorbing, since the completion of an IX route or the transit switching terminates the ISP’s attempt process (through IX environment). The transition probabilities are indicated on the arcs connecting the circles representing the chain states. The time is represented by the number of time slots, so that, indicating by X the actual state, P[X(n) = Ei]

(i=1,2) is the probability that the n+1th routing attempt is placed through the IX provider Ei, P[X(n)=Z]

is the probability that the routing traffic has been completed through Internet exchange environment within the first n attempts, and P[X(n)=T] is the probability that the ISP has given up and switching traffic to transit service provider after no more than n attempts.

(3)

Fig 2. The Markov chain model of the ISP behavior in the two IX providers case

The starting conditions (state distribution before the first route attempt) are

P[X(0)=E1] = p , (1)

P[X(0)=E2] = 1-p, (2)

P[X(0)=Z]=0, (3) P[X(0)=T]=0. (4) Since the ISP switches from E1 to E2 only if its route

congested and if it does not switch to transit service provider, the transition probability from E1 to E2 is

C1(1-pT). Consequently, the probability of a route

placed through IX provider E1 being completed in a

single attempt is 1-C1.

The one-step transition probabilities matrix is therefore

and, having two absorbing states, is neither regular nor irreducible.

The state probabilities after the first attempt can be obtained by simple relationships:

P[X(1)=E1]=P[X(0)=E2]

P[X(1)=E1|X(0)=E2] = (1-p)C2(1-pT), (6)

P[X(1) =E2]=P[X(0)=E1]

P[X(1)=E2|X(0)=E1] = pC1(1-pT), (7)

And by the recursive relationships for the subsequent attempts

P[X(n) = E1] = P[X(n-1)=E2] C2(1-pT), (8)

P[X(n) = E2] = P[X(n-1)=E1] C1(1-pT), (9)

After unwrapping the recursions we obtain the general relationships P[X(n) = E1] = p n

C

C

)

(

1 2 (1-pT)n, n even, (10) P[X(n) = E1] = (1-p)C2 1 2 1

)

(

C

C

n− (1-pT)n, n odd, (11) P[X(n) = E2] = (1-p) n

C

C

)

(

1 2 (1-pT)n, n even, (12) P[X(n) = E2] = pC1 1 2 1

)

(

C

C

n− (1-pT)n, n even, (13)

3.

The quality of service experienced by

Internet Service Provider (ISP)

From the ISP’s perspective the goal is to complete the traffic routing to the destination network. The first quality of service parameter of IX service provider is therefore the congestion probability that ISP experience. In our model the ISP continually toggles between two IX providers until the ISP either completes its connection to destination or switching to transit service provider; such a network design can be labeled the dynamic routing design. For ISP who sticks with the IX provider it has chosen for its first attempt and label the network design the static routing

E

1

E

2

Z

T

C

1

P

T

1-C

1

1-C

2

C

1

C

2

C

2

P

T 1 0 C1(1-pT) 1-C1 C1pT C2(1-pT) 0 1-C2 C2pT 0 0 1 0 0 0 0 1 1 M = (5)

(4)

design.

The static routing design always experiences the same congestion probability: C1 if it has chosen the IX

provider E1, C2 otherwise. Averaging over these two

choices gives us the average congestion probability Bs

for the static routing design:

Bs = pC1 + (1-p)C2. (14)

Instead, ISP will experience a varying congestion probability (Bd) in the dynamic routing design; at the nth attempt it is Bdn=

]

[

]

[

]

[

]

[

2 ) 1 ( 1 ) 1 ( 2 2 ) 1 ( 1 1 ) 1 (

E

X

P

E

X

P

C

E

X

P

C

E

X

P

n n n n

=

+

=

=

+

=

− − − − (15)

Since the state probabilities for the two states E1 and

E2 at the nth attempt depend on whether n is even or

odd, we have two expressions for the congestion probability Bd(n,even)= 2 1 2 1

)

1

(

p

C

pC

C

C

+

, (16) Bd(n, odd)= pC1+(1-p)C2. (17)

At each odd attempt the dynamic routing design experiences the same congestion as the average one encountered by the static routing design. On the even attempts Bd can be larger or smaller than Bs; the

dynamic routing design is favored if the geometric mean of the congestion probability C1 and C2 is

smaller than their weighted sum, i,e, if

2 1

C

C

< pC1+(1-p)C2 (18) or in other terms p > 2 1 2 2 1

C

C

C

C

C

, C1 > C2, (19) p < 2 1 2 2 1

C

C

C

C

C

, C1 < C2,

The ISP can perform its strategy based on Eq(19). For example, in Fig 3 and 4 are shown the regions of the (C1,p) plane where the dynamic routing design is

favored when the IX provider E2 congestion

probability is 0.05 and 0.2 respectively.

Fig 3. Favored strategies when C2=0.05

Fig 4. Favored strategies when C2=0.2

Based on Fig 3 and Fig 4, ISP who choose dynamic routing structure can benefit from the regions of (C1,p)

plane with dynamic routing remarked.

4.

Traffic sharing

We now can calculate the ISP traffic sharing between the two IX providers. The process is completed as ISP successfully routes its Internet traffic to the destination

0.0 0.0 0.1 0.1 0.2 0.2 0.4 0.6 0.8 1.0

Congestion probability C1 from IX provider E1

IX Pr ovider E1 init ial share Static Routing Dynamic Routing 0.0 0 0.0 0.1 0 0.1 0.2 0 0.2 0.4 0.6 0.8 1.0

Congestion probability C1 from IX provider E1

IX Pr ovider E1 init ial share p Static Routing Dynamic Routing Dynamic Routing Static Routing

(5)

network through IX provider E1. The probability that a

route is completed through IX provider E1 at the nth

attempt is

P1(n)=P{X(n-1)=E1}P{X(n)=Z|X(n-1)=E1}. (20)

Replacing the expressions (10) and (11) in (20), two different expressions depending on n:

P1(n)=p(1-C1)(1-pT)n-1 1 2 1

)

(

C

C

n, n odd, (21) P1(n)=(1-p)C2(1-C1)(1-pT)n-1 2 2 1

)

(

C

C

n, n even, (22) To obtain the cumulative probability that a route is completed through the IX provider E1 within the first

n attempts we have to sum over the number of attempts: ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎣ ⎡ − − + − − = = − = = − = =

− = − = − − = = − = i T n even i i n odd i i i i T i n i i n i i n i i n p C C C p p C C p C E X P C E X P C P P ) 1 ( ) ( ) 1 ( ) 1 ( ) ( ) 1 ( } { ) 1 ( } { ) 1 ( 1 , 0 1 , 0 1 2 1 2 2 1 1 1 0 1 ) ( 1 1 1 ) 1 ( 1 1 ) ( 1 ) ( 1 (23)

Alternatively, when n is even expression (23) can be written as , ) 1 ( 1 ] ) 1 ( [ 1 ] ) 1 )( 1 ( )[ 1 ( 2 2 1 2 2 1 2 1 ) ( 1 T n T T n p C C p C C C p p p C P − − − − − − + − = (24) When n is odd, we obtain the expression

2 2 1 1 2 2 1 2 1 2 2 1 1 ) ( 1 ) 1 ( 1 } ] ) 1 ( [ 1 { ) 1 )( 1 ( } ] ) 1 ( [ 1 { ) 1 ( T n T T n T n p C C p C C C p p p C C p C P − − − − − − + − − − = − + (25) We obtain the probability that a route is completed through the IX provider E2:

⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎣ ⎡ − + − − − = ∑− ∑ = − = − 1 ,0 1 ,0 1 2 1 1 2 1 2 2 (1 )(1 ) ( )(1 ) ( ) (1 ) n even i i n odd i i i T i i T i n p C C pC p C C p C P (26) These probabilities reflect the proportions by which the overall traffic offered by an ISP is distributed between the two IX providers; We also find the traffic shares of the two IX providers are modified with respect to the initial share probability p and 1-p because of the congestion probability it occurred.

An example of the impact of the route-by-route choice is reported in Fig 5, where the traffic share of the incumbent IX provider falls from 80% to 65% when its congestion probability is 20% and competitor’s congestion probability is 5%.

Fig 5. Exchange of traffic share during the route attempt process

(p=0.8; C1=0.2; C2=0.05; pT=0.05)

5.

Conclusion

Internet traffic prediction plays a fundamental role in network design, management, control, and optimization. Prediction on large scale network is complicated and difficult to perform a precise prediction.

The paper analyzes the traffic model in the Internet

0 1 2 3 4 0.0 No. of attempts traf fic share p 0.2 0.4 0.6 0.8 1.0 Ɋ Ɋ Ɋ Ɋ Ɍ Ɍ Ɍ Ɍ Ɍ Ɋ Ɋ!IX provider Ɍ!IX provider 2

(6)

exchange (IX) environment. We can simulate the market share dilution through competition between two Internet exchange providers. It is shown that smaller Internet exchange competitors can benefit from the competition even if their Quality of Service (QoS) is worse than the incumbent Internet exchange provider. The paper also proposed different routing strategies which reflect to the competing Internet exchange environment. Pricing and bandwidth are important elements especially in business operation. Assessing pricing strategy and bandwidth allocation in a competing IX environment will be the appropriate research area as the study moving into further development.

References

1. Awduche, D., Malcolm, J., Agogbua, J., O'Dell, M. and J. McManus, Requirements for Traffic Engineering over MPLS", RFC 2702, September 1999.

2. J.J. Gordon, K. Murti, A. Rayes, Overview of Internet traffic issues on the PSTN, 15th International Teletraffic Congress, Washington, 22-27 June 1997, pp.643-652

3. M. Naldi, The Internet’s growth problems, Telecommunications 32 (1) (1998) 55-59.

4. Rosen and Rekhter, “BGP/MPLS VPNs”, RFC2547, March 1999

5. Xin Yuan and Arif Saifee, Path selection methods for localized quality of service routing, Florida State University, Tallahassee, August 2002

6. Marcelo Spohn, Routing in Internet using Partial Link State Information, University of California, PhD thesis, 2001

7. D. Minoli and A. Schemidt, “Switched Network Services”, New York: John Wiley & Sons, Inc), 1998

8. K. Hafner and M. Lyon. “Where Wizards Stay Up Late”, New York: Simon & Schuster, 1996 9. D. Minoli,” Enterprise Networking”, Norwood

Mass: Artech House, 1992

10. S. Kent, R. Atkinson, “Security Architecture for the Internet Protocol,” Internet Drfat draft-ietf-ipsec-arch-sec-01.txt, IETF

11. D. Minoli, E. Minoli. “Delivering Voice over Frame Relay and ATM”, New York: John Wiley & Sons, Inc, 1998

12. R.G. Grrroppo, S. Giordano, A. Vaccaro, “A teletraffic analysis of dial-up connections over PSTN, Globecom 98, Sydney, November 1998 8-12

數據

Fig 1 illustrates the components of Internet  architecture.
Fig 2. The Markov chain model of the ISP behavior  in the two IX providers case
Fig 3. Favored strategies when C 2 =0.05
Fig 5. Exchange of traffic share during the route  attempt process

參考文獻

相關文件

„ Transport voice traffic using the Internet Protocol (IP). „ One of the greatest challenges to VoIP is voice

bility of the mobile system is the same as the call blocking For example, for a hexagonal planar layout with reuse dis- probability in a cell, Because traffic in

Too good security is trumping deployment Practical security isn’ t glamorous... USENIX Security

♦ The action functional does not discriminate collision solutions from classical solutions...

It has been well-known that, if △ABC is a plane triangle, then there exists a unique point P (known as the Fermat point of the triangle △ABC) in the same plane such that it

Courtesy: Ned Wright’s Cosmology Page Burles, Nolette &amp; Turner, 1999?. Total Mass Density

n The information contained in the Record-Route: header is used in the subsequent requests related to the same call. n The Route: header is used to record the path that the request

Microphone and 600 ohm line conduits shall be mechanically and electrically connected to receptacle boxes and electrically grounded to the audio system ground point.. Lines in