Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.

Slides:



Advertisements
Similar presentations
The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Jure Leskovec, CMU Lars Backstrom, Cornell Ravi Kumar, Yahoo! Research Andrew Tomkins, Yahoo! Research.
School of Information University of Michigan Network resilience Lecture 20.
SILVIO LATTANZI, D. SIVAKUMAR Affiliation Networks Presented By: Aditi Bhatnagar Under the guidance of: Augustin Chaintreau.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Inferring Autonomous System Relationships in the Internet Lixin Gao.
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
Traffic Engineering With Traditional IP Routing Protocols
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
Advanced Topics in Data Mining Special focus: Social Networks.
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
1 Internet Networking Spring 2002 Tutorial 6 Network Cost of Minimum Spanning Tree.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 7 May 14, 2006
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
On Power-Law Relationships of the Internet Topology.
New Directions and Half-Baked Ideas in Topology Modeling Ellen W. Zegura College of Computing Georgia Tech.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
The Erdös-Rényi models
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
Information Networks Power Laws and Network Models Lecture 3.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
1 Spectral Analysis of Power-Law Graphs and its Application to Internet Topologies Milena Mihail Georgia Tech.
7.1 and 7.2: Spanning Trees. A network is a graph that is connected –The network must be a sub-graph of the original graph (its edges must come from the.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
Using traveling salesman problem algorithms for evolutionary tree construction Chantal Korostensky and Gaston H. Gonnet Presentation by: Ben Snider.
The Influence of Network Topology on the Efficiency of QoS Multicast Heuristic Algorithms Maciej Piechowiak Piotr Zwierzykowski Poznan University of Technology,
1 Quantifying Path Exploration in the Internet Ricardo Oliveira, Rafit Izhak-Ratzin, Lixia Zhang, UCLA Beichuan Zhang, UArizona Dan Pei, AT&T Labs -- Research.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
ICNP 2006 Inter­domain Policy Violations in Overlay Routes Srinivasan Seetharaman, Mostafa Ammar Networking and Telecommunications Group College of Computing.
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Dijkstra’s shortest path Algorithm
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Multi-Core Parallel Routing
Peer-to-Peer and Social Networks Fall 2017
Peer-to-Peer and Social Networks
Statistics of Extreme Fluctuations in Task Completion Landscapes
Flow Networks and Bipartite Matching
Lecture 10 Graph Algorithms
Presentation transcript:

Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003

Internet Evolution Grows with time… AS-level graph

Internet Evolution Say, network doubles in size Key: Where to add capacity?

Internet Evolution Moore’s-law like scaling sufficient? If so, good scaling! Uniformly scale all capacities?

Internet Evolution Scale some links faster? Moore’s-law like scaling insufficient?

Internet Evolution Congested hot-spots If so, poor scaling!! Scale some links faster?

Key Questions How does the worst congestion grow?  O(n)? O(n 2 )? How much of this is due to…  Topology? Power-law structure Other distributions  Routing algorithm? BGP-Policy routing  Traffic demand matrix? Uniform vs. non-uniform What can be done?  Redesign the network?  Change routing?

Outline Analysis Overview – key result Results from simulation Discussion of results, network design Conclusion

Analysis in One Minute Simple evolutionary model  Preferential Connectivity Known to yield power-law graphs #nodes v with d v ≥ d is proportional to d -   Unit traffic between all node-pairs Routed along the shortest path Prefer paths through higher-degree nodes How does maximum congestion depend on n, the number of vertices?  Congestion on an edge == number of shortest path routes using the edge  Consider congestion on the edge between two highest degree nodes

Key Result Theorem: The expected maximum edge congestion is  (n 1+1/  ) (shortest path routing, any-2-any).    (n 1.8 ) or worse for the Internet (  )  Bad Scaling!

Outline Analysis Overview Results from simulation Discussion of results, network design Conclusion

Methodology: Outline Topology  Power-law #nodes v with d v ≥ d is proportional to d -  Real AS-level topologies Inet-3.0 generated synthetic  Exponential #nodes v with d v ≥ d is proportional to e -  d Inet-3.0 generated  Density same as power-law graphs of same size  Tree-like Grown from the preferential connectivity model

Methodology: Outline Routing algorithm  Shortest-path Prefer paths through high degree nodes  BGP routing Policy-based  Peers only provide transit to traffic to/from customers  Customers don’t provide transit for providers and peers Real graphs: past work on classifying edges Synthetic graphs: heuristically classify edges before imposing policy routing  Accurate maximum congestion

Methodology: Outline Traffic matrix  Uniform demands: Any-2-any Between all pairs  Non-uniform: Clout model Between “stubs” Traffic depends on “popularity”  Popularity of node u depends on degree (d u ) and avg degree of neighbors (A u )  Traffic (u  v) is proportional to popularity(u)

Methodology: Outline Given  Topology X Routing X Traffic matrix We seek  Max edge congestion as a function of n

Shortest-Path Routing (Any-2-any) Exponential >> Power law graphs > Power-law trees

Policy Routing (Any-2-Any) Poor scaling just like shortest path

Policy Routing vs. Shortest Path Any-2-Any Synthetic Graphs Real Graphs Policy routing is never worse!

The Clout Model Shortest-path routing Scaling is even worse than uniform Policy routing Same true for policy Policy routing better than shortest path!

Outline Analysis overview Results from simulation Discussion of results, network design Conclusion

Discussion Scaling according to Moore’s law insufficient  Congested hot-spots in the “core”  Policy routing has minimal impact May have to change the network  Routing: diffuse demand in a centralized manner  Structure: add additional edges to the graph

Adding Parallel Links Intuition: Congestion higher on edges with higher average degree

Adding Parallel Links #parallel links is dependant on degrees of nodes at the ends of the edge Candidate functions  Minimum, Maximum, Sum and Product of degrees Shortest path routing, any-2-any New edge congestion = edge congestion/#parallel links

Parallel Links (Shortest path, Any2Any) Even min yields  (n) scaling!  Desirable extent of AS-AS peering

Related Work “Power law graphs have good congestion properties” [Mihail03]  Allow routing with O(nlog 2 n) congestion  Incorrectly extend to shortest path routing  Also find policy routing to be worse Over smaller real graphs

Conclusion Congestion scales poorly in Internet-like graphs Policy-routing does not worsen the congestion Alleviation possible via simple, straight-forward mechanisms

Key Observations (I) e* -- edge between the top two degree nodes s 1 and s 2. Observation 1: A significant fraction of single-source shortest path trees (  n) trees) in the graph contain e*. S1S1 S2S2 e*e* S1S1 S2S2 e*e* e * occurs in both trees

Key Observations (II) Observation 2: In at least a constant fraction of the  (n) shortest path trees, s 1 and s 2 retain at least a constant fraction of their degrees. S1S1 S2S2 e*e* 4/4 4/5 S1S1 S2S2 e*e* 5/5 3/4 S 1,S 2 retain most of their degrees

Key Observations (III) Observation 3: The degrees of s 1 and s 2 are  (n 1/  ). And In each tree that e* belongs to, congestion on e*  min{deg tree (s1), deg tree (s2)}. S1S1 S2S2 e*e* So… Congestion(e*)  3