Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mikkel Thorup is active.

Publication


Featured researches published by Mikkel Thorup.


international conference on computer communications | 2000

Internet traffic engineering by optimizing OSPF weights

Bernard Fortz; Mikkel Thorup

Open shortest path first (OSPF) is the most commonly used intra-domain Internet routing protocol. Traffic flow is routed along shortest paths, splitting flow at nodes where several outgoing links are on shortest paths to the destination. The weights of the links, and thereby the shortest path routes, can be changed by the network operator. The weights could be set proportional to their physical distances, but often the main goal is to avoid congestion, i.e., overloading of links, and the standard heuristic recommended by Cisco is to make the weight of a link inversely proportional to its capacity. Our starting point was a proposed AT&T WorldNet backbone with demands projected from previous measurements. The desire was to optimize the weight setting based on the projected demands. We showed that optimizing the weight settings for a given set of demands is NP-hard, so we resorted to a local search heuristic. Surprisingly it turned out that for the proposed AT&T WorldNet backbone, we found weight settings that performed within a few percent from that of the optimal general routing where the flow for each demand is optimally distributed over all paths between source and destination. This contrasts the common belief that OSPF routing leads to congestion and it shows that for the network and demand matrix studied we cannot get a substantially better load balancing by switching to the proposed more flexible multi-protocol label switching (MPLS) technologies. Our techniques were also tested on synthetic internetworks, based on a model of Zegura et al., (1996), for which we did not always get quite as close to the optimal general routing.


IEEE Journal on Selected Areas in Communications | 2002

Optimizing OSPF/IS-IS weights in a changing world

Bernard Fortz; Mikkel Thorup

A system of techniques is presented for optimizing open shortest path first (OSPF) or intermediate system-intermediate system (IS-IS) weights for intradomain routing in a changing world, the goal being to avoid overloaded links. We address predicted periodic changes in traffic as well as problems arising from link failures and emerging hot spots.


acm symposium on parallel algorithms and architectures | 2001

Compact routing schemes

Mikkel Thorup; Uri Zwick

We describe several compact routing schemes for general weighted undirected networks. Our schemes are simple and easy to implement. The routing tables stored at the nodes of the network are all very small. The headers attached to the routed messages, including the name of the destination, are extremely short. The routing decision at each node takes <i>constant</i> time. Yet, the <i>stretch</i> of these routing schemes, i.e., the worst ratio between the cost of the path on which a packet is routed and the cost of the cheapest path from source to destination, is a small constant. Our schemes achieve a near-optimal tradeoff between the size of the routing tables used and the resulting stretch. More specifically, we obtain:<ul><li>A routing scheme that uses only O (<i>n</i> <sup>1/2</sup>) bits of memory at each node of an <i>n</i>-node network that has stretch 3. The space is <i>optimal</i>, up to logarithmic factors, in the sense that every routing scheme with stretch < 3 must use, on some networks, routing tables of total size &OHgr;(<i>n</i><sup>2</sup>), and every routing scheme with stretch < 5 must use, on some networks, routing tables of total size &OHgr;(<i>n</i><sup>3/2</sup>). The headers used are only (1 + <i>&Ogr;</i>(1)) log<sup>2</sup>> <i>n</i>-bits long and each routing decision takes <i>constant</i> time. A variant of this scheme with [log<subscrpt>2</subscrpt> <i>n</i>] -bit headers makes routing decisions in <i>&Ogr;</i>(log log <i>n</i>) time. </li><li>Also, for every integer <i>k</i> > 2, a general <i>handshaking</i> based routing scheme that uses O (<i>n</i><sup>1/k</sup>) bits of memory at each node that has stretch 2<i>k</i> - 1. A conjecture of Erdös from 1963, settled for <i>k</i> = 3, 5, implies that the routing tables are of near-optimal size relative to the stretch. The handshaking is similar in spirit to a DNS lookup in TCP/IP. Headers are <i>&Ogr;</i>(log<sup>2</sup> <i>n</i>) bits long and each routing decision takes <i>constant</i> time. Without handshaking, the stretch of the scheme increases to 4<i>k</i> — 5. One ingredient used to obtain the routing schemes mentioned above, may be of independent practical and theoretical interest: </li><li>A shortest path routing scheme for <i>trees</i> of arbitrary degree and diameter that assigns each vertex of an <i>n</i>-node tree a (1 + <i>&Ogr;</i>(1)) log<sup>2</sup> <i>n</i>-bit label. Given the label of a source node and the label of a destination it is possible to compute, in <i>constant</i> time, the port number of the edge from the source that heads in the direction of the destination. </li></ul> The general scheme for <i>k</i> > 2 also uses a clustering technique introduced recently by the authors. The clusters obtained using this technique induce a sparse and low stretch <i>tree cover</i> of the network. This essentially reduces routing in general networks into routing problems in trees that could be solved using the above technique.


IEEE Communications Magazine | 2002

Traffic engineering with traditional IP routing protocols

Bernard Fortz; Jennifer Rexford; Mikkel Thorup

Traffic engineering involves adapting the routing of traffic to network conditions, with the joint goals of good user performance and efficient use of network resources. We describe an approach to intradomain traffic engineering that works within the existing deployed base of interior gateway protocols, such as Open Shortest Path First and Intermediate System-Intermediate System. We explain how to adapt the configuration of link weights, based on a networkwide view of the traffic and topology within a domain. In addition, we summarize the results of several studies of techniques for optimizing OSPF/IS-IS weights to the prevailing traffic. The article argues that traditional shortest path routing protocols are surprisingly effective for engineering the flow of traffic in large IP networks.


Journal of the ACM | 1999

Undirected single-source shortest paths with positive integer weights in linear time

Mikkel Thorup

The single-source shortest paths problem (SSSP) is one of the classic problems in algorithmic graph theory: given a positively weighted graph G with a source vertex s, find the shortest path from s to all other vertices in the graph. Since 1959, all theoretical developments in SSSP for general directed and undirected graphs have been based on Dijkstras algorithm, visiting the vertices in order of increasing distance from s. Thus, any implementation of Dijkstras algorithm sorts the vertices according to their distances from s. However, we do not know how to sort in linear time. Here, a deterministic linear time and linear space algorithm is presented for the undirected single source shortest paths problem with positive integer weights. The algorithm avoids the sorting bottleneck by building a hierarchical bucketing structure, identifying vertex pairs that may be visited in any order.


IEEE ACM Transactions on Networking | 2005

Estimating flow distributions from sampled flow statistics

Nick G. Duffield; Carsten Lund; Mikkel Thorup

Passive traffic measurement increasingly employs sampling at the packet level. Many high-end routers form flow statistics from a sampled substream of packets. Sampling controls the consumption of resources by the measurement operations. However, knowledge of the statistics of flows in the unsampled stream remains useful, for understanding both characteristics of source traffic, and consumption of resources in the network. This paper provides methods that use flow statistics formed from sampled packet stream to infer the frequencies of the number of packets per flow in the unsampled stream. A key task is to infer the properties of flows of original traffic that evaded sampling altogether. We achieve this through statistical inference, and by exploiting protocol level detail reported in flow records. We investigate the impact on our results of different versions of packet sampling.


Journal of the ACM | 2001

Poly-logarithmic deterministic fully-dynamic algorithms for connectivity, minimum spanning tree, 2-edge, and biconnectivity

Jacob Holm; Kristian de Lichtenberg; Mikkel Thorup

Deterministic fully dynamic graph algorithms are presented for connectivity, minimum spanning tree, 2-edge connectivity, and biconnectivity. Assuming that we start with no edges in a graph with <i>n</i> vertices, the amortized operation costs are <i>O</i>(log<sup>2</sup> <i>n</i>) for connectivity, <i>O</i>(log<sup>4</sup> <i>n</i>) for minimum spanning forest, 2-edge connectivity, and <i>O</i>(log<sup>5</sup> <i>n</i>) biconnectivity.


Computational Optimization and Applications | 2004

Increasing Internet Capacity Using Local Search

Bernard Fortz; Mikkel Thorup

Open Shortest Path First (OSPF) is one of the most commonly used intra-domain internet routing protocol. Traffic flow is routed along shortest paths, splitting flow evenly at nodes where several outgoing links are on shortest paths to the destination. The weights of the links, and thereby the shortest path routes, can be changed by the network operator. The weights could be set proportional to the physical lengths of the links, but often the main goal is to avoid congestion, i.e. overloading of links, and the standard heuristic recommended by Cisco (a major router vendor) is to make the weight of a link inversely proportional to its capacity.We study the problem of optimizing OSPF weights for a given a set of projected demands so as to avoid congestion. We show this problem is NP-hard, even for approximation, and propose a local search heuristic to solve it. We also provide worst-case results about the performance of OSPF routing vs. an optimal multi-commodity flow routing. Our numerical experiments compare the results obtained with our local search heuristic to the optimal multi-commodity flow routing, as well as simple and commonly used heuristics for setting the weights. Experiments were done with a proposed next-generation AT&T WorldNet backbone as well as synthetic internetworks.


acm special interest group on data communication | 2002

Properties and prediction of flow statistics from sampled packet streams

Nick G. Duffield; Carsten Lund; Mikkel Thorup

Many routers can generate and export statistics on flows of packets that traverse them. Increasingly, high end routers form flow statistics from only a sampled packet stream in order to manage resource consumption involved.This paper addresses three questions. Firstly: what are the downstream consequences for the measurement infrastructure? Long traffic flows will be split up if the time between sampled packets exceeds the flow timeout. Using packet header traces we show that flows generated by increasingly prevalent peer-to-peer applicalions are vulnerable to this effect.Secondly: can the volume of packet-sampled flow statistics be easily determined? We develop a simple model that predicts both the export rate of flow packet-sampled flow statistics and the number of active flows. It uses unsampled flow statistics---those commonly currently collected--as its data, i.e., it does not rely on having packet header traces available.Thirdly: what properties of the original traffic stream can be inferred from the packet sampled flow statistics? We show that as well as estimating total bytes and packets, one can also infer more detail, specifically the number and average length of flows in the unsampled traffic stream, even though some flows will have no packets sampled. We believe that this information is useful, both for understanding source traffic, e.g. the dependence of flow lengths on application type, and also monitoring changes in the composition of the traffic, e.g., a flood of short flows during a DoS attack. In all cases, we evaluate our approach using packet header traces gathered in backbone and campus networks.


acm special interest group on data communication | 2001

Charging from sampled network usage

Nick G. Duffield; Carsten Lund; Mikkel Thorup

IP flows have heavy-tailed packet and byte size distributions. This make them poor candidates for uniform sampling---i.e. selecting 1 in N flows---since omission or inclusion of a large flow can have a large effect on estimated total traffic. Flows selected in this manner are thus unsuitable for use in usage sensitive billing. We propose instead using a size-dependent sampling scheme which gives priority to the larger contributions to customer usage. This turns the heavy tails to our advantage; we can obtain accurate estimates of customer usage from a relatively small number of important samples.The sampling scheme allows us to control error when charging is sensitive to estimated usage only above a given base level. A refinement allows us to strictly limit the chance that a customers estimated usage will exceed their actual usage. Furthermore, we show that a secondary goal, that of controlling the rate at which samples are produced, can be fulfilled provided the billing cycle is sufficiently long. All these claims are supported by experiments on flow traces gathered from a commercial network.

Collaboration


Dive into the Mikkel Thorup's collaboration.

Top Co-Authors

Avatar

Stephen Alstrup

IT University of Copenhagen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jacob Holm

University of Copenhagen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ken-ichi Kawarabayashi

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar

Mihai Patrascu

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bernard Fortz

Université libre de Bruxelles

View shared research outputs
Researchain Logo
Decentralizing Knowledge