Doubling Dimension in Real-World Graphs Melitta Lorraine Geistdoerfer Andersen.

Slides:



Advertisements
Similar presentations
Efficient classification for metric data Lee-Ad GottliebWeizmann Institute Aryeh KontorovichBen Gurion U. Robert KrauthgamerWeizmann Institute TexPoint.
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Embedding Metric Spaces in Their Intrinsic Dimension Ittai Abraham, Yair Bartal*, Ofer Neiman The Hebrew University * also Caltech.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Scalable Content-Addressable Network Lintao Liu
Approximations of points and polygonal chains
Metric Embeddings with Relaxed Guarantees Hubert Chan Joint work with Kedar Dhamdhere, Anupam Gupta, Jon Kleinberg, Aleksandrs Slivkins.
Cse 521: design and analysis of algorithms Time & place T, Th pm in CSE 203 People Prof: James Lee TA: Thach Nguyen Book.
The Connectivity and Fault-Tolerance of the Internet Topology
Chapter 5 Shortest Paths: Label-Correcting Algorithms
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Chapter 4: Network Layer
Navigating Nets: Simple algorithms for proximity search Robert Krauthgamer (IBM Almaden) Joint work with James R. Lee (UC Berkeley)
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Approximation Algorithms: Combinatorial Approaches Lecture 13: March 2.
CS 728 Lecture 4 It’s a Small World on the Web. Small World Networks It is a ‘small world’ after all –Billions of people on Earth, yet every pair separated.
Proximity algorithms for nearly-doubling spaces Lee-Ad Gottlieb Robert Krauthgamer Weizmann Institute TexPoint fonts used in EMF. Read the TexPoint manual.
Single Sink Edge Installation Kunal Talwar UC Berkeley.
Graphs & Graph Algorithms 2 Nelson Padua-Perez Bill Pugh Department of Computer Science University of Maryland, College Park.
Presented by Ozgur D. Sahin. Outline Introduction Neighborhood Functions ANF Algorithm Modifications Experimental Results Data Mining using ANF Conclusions.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
A Note on Finding the Nearest Neighbor in Growth-Restricted Metrics Kirsten Hildrum John Kubiatowicz Sean Ma Satish Rao.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
The Shortest Path Problem
CS8803-NS Network Science Fall 2013
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
Algorithms on negatively curved spaces James R. Lee University of Washington Robert Krauthgamer IBM Research (Almaden) TexPoint fonts used in EMF. Read.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Chapter 9 – Graphs A graph G=(V,E) – vertices and edges
1 Shortest Path Problem Topic 11 ITS033 – Programming & Algorithms C B A E D F Asst. Prof. Dr. Bunyarit Uyyanonvara IT Program,
Section 8 – Ec1818 Jeremy Barofsky March 31 st and April 1 st, 2010.
Minimum Spanning Trees CSE 2320 – Algorithms and Data Structures Vassilis Athitsos University of Texas at Arlington 1.
A Clustering Algorithm based on Graph Connectivity Balakrishna Thiagarajan Computer Science and Engineering State University of New York at Buffalo.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Lecture 13: Network centrality Slides are modified from Lada Adamic.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Slides are modified from Lada Adamic
Reliable Multicast Routing for Software-Defined Networks.
Doubling Dimension: a short survey Anupam Gupta Carnegie Mellon University Barriers in Computational Complexity II, CCI, Princeton.
Chapter 20 Unicast Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Small World Social Networks With slides from Jon Kleinberg, David Liben-Nowell, and Daniel Bilar.
Percolation Percolation is a purely geometric problem which exhibits a phase transition consider a 2 dimensional lattice where the sites are occupied with.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
Presenters: Amool Gupta Amit Sharma. MOTIVATION Basic problem that it addresses?(Why) Other techniques to solve same problem and how this one is step.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Algorithm Analysis with Big Oh ©Rick Mercer. Two Searching Algorithms  Objectives  Analyze the efficiency of algorithms  Analyze two classic algorithms.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
1 GRAPHS – Definitions A graph G = (V, E) consists of –a set of vertices, V, and –a set of edges, E, where each edge is a pair (v,w) s.t. v,w  V Vertices.
The network layer: routing
Presented by Alexei Semenov
(How the routers’ tables are filled in)
TODAY’S TENTATIVE AGENDA
Peer-to-Peer and Social Networks
(How the routers’ tables are filled in)
Graphs & Graph Algorithms 2
Graphs Chapter 11 Objectives Upon completion you will be able to:
Graph Operations And Representation
cse 521: design and analysis of algorithms
Introduction Wireless Ad-Hoc Network
Embedding Metrics into Geometric Spaces
The Intrinsic Dimension of Metric Spaces
Hierarchical Routing in Networks with Bounded Doubling Dimension
Routing in Networks with Low Doubling Dimension
Presentation transcript:

Doubling Dimension in Real-World Graphs Melitta Lorraine Geistdoerfer Andersen

Recap: Definition A metric space is a set X together with distance function d that gives a non-negative distance between any 2 points in X and satisfies 3 properties: A metric space is a set X together with distance function d that gives a non-negative distance between any 2 points in X and satisfies 3 properties: d(x,y) = 0 if and only if x = y d(x,y) = 0 if and only if x = y d(x,y) = d(y,x) d(x,y) = d(y,x) The triangle inequality holds: d(x,y) + d(y,z) ¸ d(x,z) The triangle inequality holds: d(x,y) + d(y,z) ¸ d(x,z) The doubling dimension of a metric space (X,d) is the least k such that any ball of radius R can be covered by 2 k balls of radius R/2. The doubling dimension of a metric space (X,d) is the least k such that any ball of radius R can be covered by 2 k balls of radius R/2. So the doubling dimension is log 2 of the maximum over all centers and all radii of the number of balls of half radius it takes to cover a ball with a specific center and radius. So the doubling dimension is log 2 of the maximum over all centers and all radii of the number of balls of half radius it takes to cover a ball with a specific center and radius.

An Example with a Set of Points In this case, all of the points can be covered by 2 k=2 balls of radius R/2. Each of the balls also have a doubling dimension of 2. And each of those contain no more than 2 2 points. When the doubling dimension is a constant (i.e. bounded) the metric is called a doubling metric.

Some Uses of Doubling Dimension Chan, Gupta, Maggs, and Zhou proved that for any network that has a metric with a bounded doubling dimension, a hierarchical routing structure can be imposed on it. Chan, Gupta, Maggs, and Zhou proved that for any network that has a metric with a bounded doubling dimension, a hierarchical routing structure can be imposed on it. With this structure, the network can be addressed in such a way as to be able to get routing information from the addresses of the source and the destination. With this structure, the network can be addressed in such a way as to be able to get routing information from the addresses of the source and the destination. This routing also achieves minimum or near-minimum path length. This routing also achieves minimum or near-minimum path length. There are also efficient nearest-neighbor algorithms that work with a graph of low doubling dimension. There are also efficient nearest-neighbor algorithms that work with a graph of low doubling dimension.

Now We Can Apply It To A Graph We found a 200,000 node router level graph of the Internet at er/router_topology/. We found a 200,000 node router level graph of the Internet at er/router_topology/. er/router_topology/ er/router_topology/ This was an adjacency graph, so we treated all edges as unit distances. This was an adjacency graph, so we treated all edges as unit distances. The doubling dimension was ~14. The doubling dimension was ~14.

Average Covering for Each Radius Plotted on a log scale (because the x axis is also on a log scale), the average number of balls increased nearly linearly until it reached radius 8. One interpretation of the downturn is the finite nature of the graph. At R=64, only one ball of radius 32 is required to cover the entire ball. Hence, the diameter of the graph is at most 32.

But What About Latencies? This was all well and good for an adjacency graph, but for routing you actually want to know the fastest route. So we needed a weighted graph. This was all well and good for an adjacency graph, but for routing you actually want to know the fastest route. So we needed a weighted graph. n/data.php yielded a graph that measured latencies between 2,500 sites. n/data.php yielded a graph that measured latencies between 2,500 sites. n/data.php n/data.php The doubling dimension of this weighted graph was ~9. The doubling dimension of this weighted graph was ~9.

Covering for a Weighted Graph Plotted on a log scale, the average number of balls formed a more symmetric curve than the unweighted graph. There were few nodes within range for the lower radii, and at the higher radii, we again saw the effects of a finite graph. One thing of note is the spike of 2 after 1 had already been reached.

A Possible Explanation One thing that could cause the spike is a 2 cluster graph. Everything within a ball of a certain size can be covered by a ball of half the radius, for both clusters. But when you double that radius, you run into the other cluster, so 2 balls are required to cover the whole thing.

Infinite Graphs? Another thing to note is that the doubling dimension is finite because the graph is finite. If this were a section of an infinite doubling metric the doubling dimension would eventually flatten out and become constant. Though the graph does start to flatten out at the peak, we don’t know if this merely indicates that the finite nature of the graph is affecting it.

Other Graphs We had so much fun with doubling dimension on these graphs, we wanted to find other graphs to play with. But what other interesting graphs are out there? We had so much fun with doubling dimension on these graphs, we wanted to find other graphs to play with. But what other interesting graphs are out there? The Citation Graph connects authors of papers by references. An edge indicates that the author cited a paper by the other author in one of his papers. The Citation Graph connects authors of papers by references. An edge indicates that the author cited a paper by the other author in one of his papers. People use these graphs to study nearest neighbor algorithms. People use these graphs to study nearest neighbor algorithms. The doubling dimension of this graph is ~12. The doubling dimension of this graph is ~12.

The Citation Graph This graph looks similar to the router graph. The Citation Graph also has unit distances for the edges, so this similarity makes sense. The earlier downward turn could be due to the high degree of each node. Many authors write many papers, and cite a large number of papers in them.

More Graphs Doubling dimension can give us information about many types of graphs. Doubling dimension can give us information about many types of graphs. For instance, using the Internet Movie Database a graph of actors can be created with edges connecting two actors who were in the same movie. For instance, using the Internet Movie Database a graph of actors can be created with edges connecting two actors who were in the same movie. The doubling dimension of this graph is ~14. The doubling dimension of this graph is ~14.

Yet Another Signature Graph This graph started it’s downward trend right away. One possible explanation is that this graph is much denser than the router graph, so the balls of radius 2 cover many points that may not be within 1 hop of each other.

The Effects of Scaling The actor graph had 400,000 nodes. This made it an interesting graph for experimentation with scaling. If we included only a portion of the nodes, what would that do to the dimension?

Doubling Dimensions Plotted on a log scale, the graph increases logarithmically until the maximum doubling dimension is reached.

Conclusions Finite graphs have bounded doubling dimensions. Finite graphs have bounded doubling dimensions. Different types of graphs have different signature cover graphs. Different types of graphs have different signature cover graphs. The number of nodes in a graph has some relation to the doubling dimension. The number of nodes in a graph has some relation to the doubling dimension. I like playing with graphs. I like playing with graphs.

Future Work Actually implementing the routing algorithm on a graph. Actually implementing the routing algorithm on a graph. Measuring latencies of adjacent routers to get a more accurate picture to work with. Measuring latencies of adjacent routers to get a more accurate picture to work with. Figuring out bounds on how scaling effects doubling dimension, possibly working with some infinite graphs. Figuring out bounds on how scaling effects doubling dimension, possibly working with some infinite graphs.