Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.

Slides:



Advertisements
Similar presentations
The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
SILVIO LATTANZI, D. SIVAKUMAR Affiliation Networks Presented By: Aditi Bhatnagar Under the guidance of: Augustin Chaintreau.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Inferring Autonomous System Relationships in the Internet Lixin Gao.
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
CSC 2300 Data Structures & Algorithms April 17, 2007 Chapter 9. Graph Algorithms.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 7 May 14, 2006
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
Internet Traffic Policies and Routing Vic Grout Centre for Applied Internet Research (CAIR) University of Wales NEWI Plas Coch Campus, Mold Road Wrexham,
On Power-Law Relationships of the Internet Topology.
New Directions and Half-Baked Ideas in Topology Modeling Ellen W. Zegura College of Computing Georgia Tech.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
The Erdös-Rényi models
Information Networks Power Laws and Network Models Lecture 3.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
7.1 and 7.2: Spanning Trees. A network is a graph that is connected –The network must be a sub-graph of the original graph (its edges must come from the.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
Using traveling salesman problem algorithms for evolutionary tree construction Chantal Korostensky and Gaston H. Gonnet Presentation by: Ben Snider.
The Influence of Network Topology on the Efficiency of QoS Multicast Heuristic Algorithms Maciej Piechowiak Piotr Zwierzykowski Poznan University of Technology,
Graphs. Definitions A graph is two sets. A graph is two sets. –A set of nodes or vertices V –A set of edges E Edges connect nodes. Edges connect nodes.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 CIS 4930/6930 – Recent Advances in Bioinformatics Spring 2014 Network models Tamer Kahveci.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
Graphs Definition: a graph is an abstract representation of a set of objects where some pairs of the objects are connected by links. The interconnected.
System & Network Reading Group On Selfish Routing In Internet-Like Evironments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
(How the routers’ tables are filled in)
Multi-Core Parallel Routing
Peer-to-Peer and Social Networks Fall 2017
Peer-to-Peer and Social Networks
Flow Networks and Bipartite Matching
Lecture 10 Graph Algorithms
Presentation transcript:

Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003

Internet Evolution AS interconnects: varied capacities AS-level graph

Internet Evolution Say, network doubles in size

Internet Evolution Moore’s-law like scaling sufficient? If so, good scaling! Double all capacities?

Internet Evolution Plain doubling not enough? Moore’s-law like scaling insufficient?

Internet Evolution Congested hot-spots If so, poor scaling!! Plain doubling not enough?

Key Questions How does the worst congestion grow?  O(n)? O(n 2 )? How much of this is due to…  Power-law structure? Other distributions  Routing algorithm? BGP-Policy routing  Traffic demand matrix? What can be done?  Redesign the network?  Change routing?

Outline Analysis Overview Results from simulation Discussion of results, network design Conclusion

Outline Analysis Overview  Outline key observations Results from simulation Discussion of results, network design Conclusion

Analysis To understand scaling properties of power-law graphs  Sanity check the (more realistic) simulation results Simple evolutionary model  Preferential Connectivity Known to yield power-law graphs  Unit traffic between all node-pairs Routed along the shortest path How does maximum congestion depend on n, the number of vertices?  Congestion on an edge == number of shortest path routes using the edge Analysis mainly for intuition; simulation results have the final say.

Key Observations (I) e* -- edge between the top two degree nodes s 1 and s 2. Observation 1: A significant fraction of single-source shortest path trees (  n) trees) in the graph contain e*. S1S1 S2S2 e*e* S1S1 S2S2 e*e* e * occurs in both trees

Key Observations (II) Observation 2: In at least a constant fraction of the  (n) shortest path trees, s 1 and s 2 retain at least a constant fraction of their degrees. S1S1 S2S2 e*e* 4/4 4/5 S1S1 S2S2 e*e* 5/5 3/4 S 1,S 2 retain most of their degrees

Key Observations (III) Observation 3: The degrees of s 1 and s 2 are  (n 1/  ). And In each tree that e* belongs to, congestion on e*  min{deg tree (s1), deg tree (s2)}. S1S1 S2S2 e*e* So… Congestion(e*)  3

Key Result Theorem: The expected maximum edge congestion is  (n 1+1/  ) (shortest path routing, any-2-any).    (n 1.8 ) or worse for the Internet. Bad Scaling!

Outline Analysis Overview Results from simulation Discussion of results, network design Conclusion

Outline Analysis Overview Results from simulation  Methodology  A few plots Discussion of results, network design Conclusion

Methodology: Outline Topology  Power-law Real AS-level topologies Inet-3.0 generated synthetic  Exponential Inet-3.0 generated; density same as similar- sized Inet power-law graphs  Tree-like Grown from the preferential connectivity model

Methodology: Outline Routing algorithm  Shortest-path  BGP routing Policy-based, valley-free Synthetic graphs: heuristically classify edges before imposing policy routing

Methodology: Outline Traffic matrix  Uniform demands: Any-2-any Between all pairs  Non-uniform: Clout model Between “leaves” or “stubs” Popularity: average degree of the neighbors Stub identification

Methodology: Outline Topology X Routing X Traffic matrix We seek  Max edge congestion as a function of n

Shortest-Path Routing (Any-2-any) Exponential >> Power law graphs > Power-law trees

Policy Routing (Any-2-Any) Poor scaling just like shortest path, but…

Policy Routing vs. Shortest Path Any-2-Any Synthetic Graphs Real Graphs Policy routing is never worse!

The Clout Model Scaling is even worse Same true for policy… But policy routing is better again!

Outline Analysis overview Results from simulation Discussion of results, network design Conclusion

Discussion Scaling according to Moore’s law insufficient  Congested hot-spots in the “core” May have to alter routing or the macroscopic structure  Routing: Diffuse demand in a centralized manner  Structure: Add additional edges to the graph

Adding Parallel Links Intuition: Congestion higher on edges with higher avg degree

Adding Parallel Links #parallel links is dependant on degrees of nodes at the ends of the edge Candidate functions  Minimum, Maximum, Sum and Product of degrees Shortest path routing, any-2-any New edge congestion = edge congestion/#parallel links

Parallel Links Even min yields  (n) scaling!  Desirable extent of AS-AS peering

Conclusion Congestion scales poorly in Internet-like graphs Policy-routing does not worsen the congestion Alleviation possible via simple, straight-forward mechanisms