Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
The Connectivity and Fault-Tolerance of the Internet Topology
School of Information University of Michigan Network resilience Lecture 20.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Measuring the Internet in real time. Scott Kirkpatrick, Systems Group (HUJI), and EVERGROW partners: DIMES (TAU) and ETOMIC (Budapest, Navarra)
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
The Internet’s Dynamic Geography Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem and EVERGROW Collaborators (thanks, not blame…)
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
Analysis of BGP Routing Tables
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
The Internet as a computing surface Avogadro-scale Computing MIT, April 17, 2008 Scott Kirkpatrick Hebrew University of Jerusalem and CBA, MIT.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Near-Deterministic Inference of AS Relationships Udi Weinsberg A thesis submitted toward the degree of Master of Science in Electrical and Electronic Engineering.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
Measurement and Analysis of Online Social Networks Alan Mislove,Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Presented.
Diffusion – Diffusion of Innovations Diffusion is the process by which an Innovation is Communicated through certain Channels over Time among.
The Internet’s Physical Topology (or, Will the Internet ever measure itself?)‏ Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
The Erdös-Rényi models
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
Measuring and Analyzing Networks Scott Kirkpatrick Hebrew University of Jerusalem April 12, 2011.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
P2P Architecture Case Study: Gnutella Network
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Chapter 3. Community Detection and Evaluation May 2013 Youn-Hee Han
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Physics of Flow in Random Media Publications/Collaborators: 1) “Postbreakthrough behavior in flow through porous media” E. López, S. V. Buldyrev, N. V.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Informatics tools in network science
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
PEER-TO-PEER NETWORK FAMILIES
Slobodan Milanko Manweiler, J., Franklin, P., & Choudhury, R. R. (2012, March). RxIP: Monitoring the health of home wireless networks. In INFOCOM, 2012.
Department of Computer Science University of York
Peer-to-Peer Information Systems Week 6: Performance
Presentation transcript:

Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran Shir, and Yuval Shavitt 25 May, 2005 Copyright, Pixar, Inc. 2003

– Internet topology map Previous efforts to measure the Internet have used: –One machine + Traceroute to many destinations –Many* machines, specially deployed to traceroute to many destinations * Many <= 50 because of management headaches Sites restricted to academic or gov’t labs, on network backbone General perception was that Law of Diminishing Returns has set in seems to have made a breakthroughhttp:// –Don’t manage machines, offer a very lightweight, limited purpose client, and collect its measurements centrally 100 – 1000 clients via word-of-mouth (Sep04 to April05) 1000 – 5000 clients achieved via press, slashdot, still in the geek community –(May05 -- ?) 5000 – clients in the general public by offering services in return –Somewhere in the client range, we have the network monitoring itself, and the possibility that it can also manage itself in real time.

Contribution distribution with 2K users, >3K agents

Exploring the DIMES AS-graph We consider the Internet at the level of its autonomous systems (ASes) Previous studies have used degree as indicator to decompose networks –In particular, the Faloutsos’ “jellyfish model” Identify core of network as maximal clique Shells around network labeled by hop count from core (a small world) Find unusual structure of peripheral sites We consider longer-range connectivity, using k-pruning. K-core, K-shell, and K-crusts result –K-shell is “derivative” of K-core, K-crust is union of K-shells –Near power-law structure of a new “inflow” region is observed –K-shells are not connected, but K-crusts have a giant cluster For Erdos-Renyi graphs, K-core is w.h.p. K-connected. For scale free? Result – focus attention on the capabilities of the inflow region, in support of P2P, chat, local traffic. Next steps – reachability is much harder than percolation.

How does original degree map into k-shell?

K-shell decomposition

K-shell decomposition, March 2005

K-shell decomposition, April 2005

May 20, slashdot doubles DIMES users

Now offering: monthly public stats

The K-core is at least K-connected

K-shell for network visualization Using LaNet-Vi

Michalis Faloutsos’ Jellyfish Highly connected nodes form the core Each Shell: adjacent nodes of previous shell, except 1- degree nodes Importance decreases as we move away from core 1-degree nodes hanging The denser the 1-degree node population the longer the stem Core Shells 1 2 3

Meduza (מדוזה) model In January, the inner core was at K = 30, but this picture persists to the present day, when core is >40.

K-crusts show percolation threshold Data from  These are the hanging tentacles of our (Red Sea) Jellyfish Largest cluster in each shell

Tendrils occur over a range of k-shells

Links per site of k-shells to k-core (above) and to k-crust (below)

Where do the links go in Medusa? Early shells (1-10) link to intermediate shells as well as to the core.

Average distance between sites in a crust

K-shell participation in giant clusters

Random scale-free graphs produce the same structure Seen in both Barabasi-style and Molloy-Reed models of scale free networks

Next steps New data permits reexamining the clustering behavior –Much data not seen in previous BGP-based studies –This is the major deviation from simple random models –Analyze as a function of k-shell, instead of simply degree Reachability is not percolation, but can be evaluated –Decision to transmit a message depends on sender and destination, not simply on the existence of a link –Cost of evaluating uphill-downhill reachability is comparable to shortest path

Preliminary reachability data (std data set)

Now add sideways steps at top of path

Now restrict to the 20-crust

Sideways step less effective inside crust