Mapping the Internet Topology Via Multiple Agents.

Slides:



Advertisements
Similar presentations
Improving Internet Availability. Some Problems Misconfiguration Miscoordination Efficiency –Market efficiency –Efficiency of end-to-end paths Scalability.
Advertisements

University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
The Connectivity and Fault-Tolerance of the Internet Topology
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
On Power-Law Relationships of the Internet Topology Michalis Faloutsos Petros Faloutsos Christos Faloutsos.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Link creation and profile alignment in the aNobii social network Luca Maria Aiello et al. Social Computing Feb 2014 Hyewon Lim.
Exp. vs. Scale-Free Poisson distribution Exponential Network Power-law distribution Scale-free Network.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
Social Networks and Graph Mining Christos Faloutsos CMU - MLD.
1 Complex systems Made of many non-identical elements connected by diverse interactions. NETWORK New York Times Slides: thanks to A-L Barabasi.
Network Design IS250 Spring 2010 John Chuang. 2 Questions  What does the Internet look like? -Why do we care?  Are there any structural invariants?
UNIVERSITY OF JYVÄSKYLÄ Power-law Networks InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Researcher.
CS 728 Lecture 4 It’s a Small World on the Web. Small World Networks It is a ‘small world’ after all –Billions of people on Earth, yet every pair separated.
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Principles in Communication Networks Instractor: Dr. Yuval Shavitt, –Office hours: room 303 s/w eng. bldg., Mon 14:00- 15:00 Prerequisites (דרישות קדם):
Evaluating the Cost of Frequency Diversity in Communication and Routing Overview Jorge Ortiz* ♦ David Culler* Causes of Loss  Pairs of nodes sharing a.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Routing.
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
Dennis Ippoliti 12/6/ MULTI-PATH ROUTING A packet by packet multi-path routing approach.
Delivery, Forwarding, and Routing
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
TICTOC -Topology-Discovery and Clock-Discovery TICTOC BOF IETF70 Stewart Bryant
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Measurement and Evolution of Online Social Networks Review of paper by Ophir Gaathon Analysis of Social Information Networks COMS , Spring 2011,
On Power-Law Relationships of the Internet Topology.
Models and Algorithms for Complex Networks Networks and Measurements Lecture 3.
Introduction to Routing and Routing Protocols By Ashar Anwar.
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
Stefano Boccaletti Complex networks in science and society *Istituto Nazionale di Ottica Applicata - Largo E. Fermi, Florence, ITALY *CNR-Istituto.
Complex Networks First Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
1 “Erdos and the Internet” Milena Mihail Georgia Tech. The Internet is a remarkable phenomenon that involves graph theory in a natural way and gives rise.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
Analysis of biological networks Part III Shalev Itzkovitz Shalev Itzkovitz Uri Alon’s group Uri Alon’s group July 2005 July 2005.
Simulation of the OLSRv2 Protocol First Report Presentation.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Agenda Instructor introduction 1. Introduction toEldarin 2.
Complex Network Theory – An Introduction Niloy Ganguly.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Complex Network Theory – An Introduction Niloy Ganguly.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs Leman Akoglu, Mary McGlohon, Christos Faloutsos Carnegie Mellon University School.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
March 3, 2009 Network Analysis Valerie Cardenas Nicolson Assistant Adjunct Professor Department of Radiology and Biomedical Imaging.
TCP-IP: Sliding Window protocol Sameer --- Brief description about the concept (1-2 lines)‏
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
The intimate relationship between networks' structure and dynamics
Improved Algorithms for Network Topology Discovery
No Direction Home: The True cost of Routing Around Decoys
(How the routers’ tables are filled in)
© 2006 ITT Educational Services Inc.
COMPUTER NETWORKS CS610 Lecture-42 Hammad Khalid Khan.
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Mapping the Internet Topology Via Multiple Agents

What does the internet look like?

Why do we care? While communication protocols will work correctly on ANY topology ….they may not be efficient for some topologies Knowledge of the topology can aid in optimizing protocols

Topics Power laws in the internet topology Sampling bias in existing topology measurements The DIMES project Potential applications Open issues

Mapping the Internet Required characteristics: – connectivity –delays Metrics –In/Outdegree –Distance (delay – problematic definition)

Problem definition G – (un)directed graph N – number of nodes E – number of edges d v – outdegree of a node v f d – frequency of an outdegree P(h) – number of pairs in the “h-hop neighborhood”

On Power-law Relationships of the Internet Topology Oct. 1999, Faloutsos Bros. Mapped the internet at the AS and router level using BGP route views Data sets: –Nov. ’97: 3015 nodes, 5156 edges –Apr. ’98: 3530 nodes, 6432 edges –Dec. ’98: 4389 nodes, 8256 edges

Outdegree Exponent Power Law f d ~ d ^σ

Other places that people look for power laws…

SCIENCE CITATION INDEX (  = 3) Nodes: papers Links: citations (S. Redner, 1998) P(k) ~k -  PRL papers (1988) Witten-Sander PRL 1981

Sex-web Nodes: people (Females; Males) Links: sexual relationships Liljeros et al. Nature Swedes; 18-74; 59% response rate.

Recall – the Faloutsos graph

Is It Really Power Law? Sampling bias could exist Crovella article title Target – find out if bias exists in prevailing measurement methods, and identify the sources for this bias. Configuration – graph model, sampling method, distributions, why this is similar to currently used methods

Results Erdos – Renyi + graphs

Sources of sampling bias Disproportional sampling of nodes Disproportional sampling of edges Conclusion Identify problems in existing measurement methods (Faloutsos, Caida)

Analysis of Bias Cause Explanation –Better coverage with more measurement sources

DIMES Targets How we try to solve the problem

DIMES Platform Description Screenshot

Internet according to DIMES maps

Application Research –Simulations Developing new algs, protocols Evolution (how will the internet look like in 2020?) Testing new tools, manufacturing scenarios –“pure” research Studying the internet “behavior”, growth Developing models to describe it

More Application Potentially commercial –Improve existing algs’ using knowledge about the characteristics of the internet. Multicast alg’ Low – priority packet routing –Identify (and work around?) network vulnerabilities

Open Issues Measuring delays –Asymmetry –round trip is problematic –triangle inequality doesn’t necessarily hold Mapping interfaces to server Identifying POPs Identifying motiffs