The Connectivity and Fault-Tolerance of the Internet Topology

Slides:



Advertisements
Similar presentations
Path Splicing with Network Slicing
Advertisements

Scale Free Networks.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
Fabian Kuhn, Microsoft Research, Silicon Valley
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
NetMine: Mining Tools for Large Graphs Deepayan Chakrabarti Yiping Zhan Daniel Blandford Christos Faloutsos Guy Blelloch.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mapping the Internet Topology Via Multiple Agents.
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
1 On Compressing Web Graphs Michael Mitzenmacher, Harvard Micah Adler, Univ. of Massachusetts.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
Presented by Ozgur D. Sahin. Outline Introduction Neighborhood Functions ANF Algorithm Modifications Experimental Results Data Mining using ANF Conclusions.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Computer Science Sampling Biases in IP Topology Measurements John Byers with Anukool Lakhina, Mark Crovella and Peng Xie Department of Computer Science.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Lecture 3 Power Law Structure Ding-Zhu Du Univ of Texas at Dallas.
Application of Graph Theory to OO Software Engineering Alexander Chatzigeorgiou, Nikolaos Tsantalis, George Stephanides Department of Applied Informatics.
Doubling Dimension in Real-World Graphs Melitta Lorraine Geistdoerfer Andersen.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
Theoretical Bounds on Control- Plane Self Monitoring in Routing Protocols Raj Kumar Rajendran Vishal Misra Dan Rubenstein.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Scalable Construction of Resilient Overlays using Topology Information Mukund Seshadri Dr. Randy Katz.
On Power-Law Relationships of the Internet Topology.
Decomposing Networks and Polya Urns with the Power of Choice Joint work with Christos Amanatidis, Richard Karp, Christos Papadimitriou, Martha Sideri Presented.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
1 Constant Following Distance Simulations CS547 Final Project December 6, 1999 Jeremy Elson.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Efficient Gathering of Correlated Data in Sensor Networks
Extreme-scale computing systems – High performance computing systems Current No. 1 supercomputer Tianhe-2 at petaflops Pushing toward exa-scale computing.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1 Nasser Alsaedi. The ultimate goal for any computer system design are reliable execution of task and on time delivery of service. To increase system.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
NA62 Trigger Algorithm Trigger and DAQ meeting, 8th September 2011 Cristiano Santoni Mauro Piccini (INFN – Sezione di Perugia) NA62 collaboration meeting,
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
The Cost of Fault Tolerance in Multi-Party Communication Complexity Binbin Chen Advanced Digital Sciences Center Haifeng Yu National University of Singapore.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Du, Faloutsos, Wang, Akoglu Large Human Communication Networks Patterns and a Utility-Driven Generator Nan Du 1,2, Christos Faloutsos 2, Bai Wang 1, Leman.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Traffic-aware Inter-Domain Routing for Improved Internet Routing Stability Zhenhai Duan Florida State University 1.
Topics In Social Computing (67810) Module 1 Introduction & The Structure of Social Networks.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Data Center Network Architectures
Topics In Social Computing (67810)
A paper on Join Synopses for Approximate Query Answering
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
NetMine: Mining Tools for Large Graphs
Intra-Domain Routing Jacob Strauss September 14, 2006.
Discrete Maths 9. Graphs Objective
Presentation transcript:

The Connectivity and Fault-Tolerance of the Internet Topology Christopher R. Palmer (CMU) crpalmer@cs.cmu.edu Georgos Siganos (UC Riverside) Michalis Faloutsos (UC Riverside) Phillip B. Gibbons (Bell-Labs) Christos Faloutsos (CMU)

Understanding the Internet The Internet is very important in daily life! How long has it been since you sent bits into the Internet? But we don’t really know much about it. Why? The Internet is huge. Detailed data only recently available for study. Hard to process using existing tools. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Who Cares if we Understand it? It helps for designing new algorithms! E.g. How can you design a new routing algorithm? Once we have new algorithms we need to test them: Typically can’t deploy your software. Must use a simulator to validate your approach. Can’t simulate the Internet until we understand it! Helps to know where the next problems will arise. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Our Approach Treat the Internet (at a Router level) as a large graph. Unweighted undirected graph. 285K nodes (routers) and 430K edges (links). Look at the properties of the nodes of this graph: In the past, looked at degree (avg / max / power-laws). Now we are going to try to start to classify them. Use properties of the graph to look at fault tolerance: What if a communication channel fails? What if a Router fails? nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Our Contributions Add to our understanding of the topology: Get a better idea of what makes up the “core”. Get a better idea of the robustness of the Internet. Introduce some tools to help people do more! At least as important as our new understanding. Gives others tools to explore their ideas. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Roadmap Introduce and motivate our data-mining tools and data: Neighbourhood function of a node (router). Neighbourhood function of a graph (network). Effective eccentricity. Hop plot exponent. Router level Internet data that we will study. Use our tools to identify interesting routers. Use our tools to examine fault tolerance. Conclusions. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Tool #1: Neighbourhood of a Node Example Graph Example Neighbourhood Fn 9 8 7 6 5 4 3 2 1 N(u,h) u 1 2 3 4 5 h N(u,h) = # of nodes within h steps of u = |{ v : dist(u,v)  h }| nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Tool #2: Neighbourhood Function N(u,h) = # of nodes within h steps of u = |{ v : dist(u,v)  h }| N(h) = # of pairs of nodes with h steps of each other = u N(u,h) nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Why use the Neighbourhood? Individual neighbourhood function: Metric that characterizes a router’s view of the world. Conjecture: Similar functions => similar routers ? Graph’s neighbourhood function: Metric that characterizes the overall “look” of a graph. Conjecture: Similar functions => similar graphs? Now we need ways of computing and comparing them. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

How to Compute them? Approximate Neighbourhood Function Idea: Developed as a tool for Data Mining large graphs Going to use it here to analyze network graphs Very fast approximation with good error bounds. Idea: approximate the set operations in the previous “algorithm” u nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Properties of our Approximation Very fast: More than 400 times faster on an Internet graph! Very accurate: About a 5% relative error. Works for very large graphs: We have a version that uses secondary storage efficiently. See the paper for more details and references. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Tool #3: Effective Eccentricity 90% of the # reachable Effective Eccentricity of 10 Neighbourhood function for node 10 Effective eccentricity is the first distance, h, at which you can reach 90% of the nodes in your connected component. EffEcc(u) = min h N(u,h)  .9  N(u,) nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Hop exponent is the slope of the least-squares line we fit to N(u,h). Tool #4: Hop Exponent [Faloutsos, Faloutsos and Faloutsos]: Internet follows a hop plot exponent power law? N(h)  hH Hop exponent, H: Slope of l.s. line. Characterizes growth of N(u,h) or N(h). Succinct description. Gives a simple way to compare two neighbourhood functions. Same graph Hop exponent is the slope of the least-squares line we fit to N(u,h). nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Our Data: Scan+Lucent Data Set Two projects used traceroute like probes: SCAN: Multiple robots collect linkage information. Lucent: Single source probes network over time. Carefully merged to form best picture of Internet. Data was current as of late 1999. # Nodes # Edges Average Degree Max. Degree 285K 430K 3.15 1,978 nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Roadmap Introduced our data-mining tools and data. Use our tools to classify routers: Effective Eccentricity vs. Hop Exponent ? Find pathologies in the data. Find “core” or “important” routers. Use our tools to examine fault tolerance. Conclusions. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Hop Exponent vs. Eff. Eccentricity Strongly correlated – may use either metric Use hop exponent for a continuous value. Use effective eccentricity for “binned” values. Hop Exponent Effective eccentricity nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Effective Eccentricity Compute effective eccentricities for each node in graph View this data as a histogram (number of nodes is log scale) # of nodes with this eccentricity [log scale] We can learn a lot by looking at the different parts of this histogram Effective Eccentricity nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Identify Outliers / Data Errors Actual Subgraph of these nodes Eff. Ecc. of 1 or 2 Maximum degree of a node is <= 2K Effective eccentricity of 1 implies can reach at most 2K/.9 nodes That is, those nodes cannot reach entire 285K node graph! nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Identify “Important” Nodes Topologically important nodes: very well connected. Conjecture: These are “core” routers in the Internet. Will try to show that this is the case later in this talk. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

“Poor” Nodes ? Internet Who and what are these nodes? Data collection error? Poorly connected countries? Other? nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Classifying Routers Effective Eccentricity is a new metric that allows us to: Identify data irregularities. Found errors in the collected data. Found routers that were surprising and should be investigated. Find “core” routers ? We found topologically important nodes. In a few slides I’ll add some evidence to suggest that they are really “core” routers. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Roadmap Introduced our data-mining tools and data. Used our tools to classify routers. Use our tools to examine fault tolerance: What if: communication links fail? What if: routers fail? Are our “core” routers actually important? Conclusions. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Fault Tolerance Want to understand inherent fault tolerance: Not concerned about protocol errors. Instead, focus on the communication that is possible. Types of faults simulated: Link failures: e.g. backhoe digs into a network cable. Router failures: e.g. fire at the data center. Measure: Impact on possible communication. Impact on the Internet structure. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Link Failures Experiment: Pick an edge at random, delete it and measure network disruption. >25K deletions for big change 150K deletions, it still “looks” like the Internet Internet very resilient to link failures nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Node Failures We will model three different events. Random router failures: Pick a node at random and delete it (and all incident edges). Hop exponent rank failures: Delete nodes in decreasing order of hop exponent. Test our claim of finding “core” routers. Degree rank failures: Delete nodes in decreasing order of node degree. Most aggressive way of attacking the Internet? nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Effect of node deletions Robust to random failures, focussed failures are a problem Core routers are different from high degree routers and identified by the individual hop exponents ? Random deletions don’t change the “look” of the Internet, the other deletions do. Disconnection is relatively slow for random failures. Faster for hop exponent and degree. nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet

Conclusions Neighbourhood function a good metric of importance: Found “core” routers in the Internet. Found data errors / outliers. Found interesting fault tolerance results: Internet is not sensitive to link failures. Internet is not sensitive to random router failures. Internet is sensitive to targeted attacks. Our data-mining tools provide a promising step forward in understanding the Internet topology! nrdm 2001 - Christopher R. Palmer – Connectivity and Fault Tolerance of the Internet