1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.

Slides:



Advertisements
Similar presentations
Hidden Metric Spaces and Navigability of Complex Networks
Advertisements

The Universal Laws of Structural Dynamics in Large Graphs Dmitri Krioukov UCSD/CAIDA David Meyer & David Rideout UCSD/Math M. Boguñá, M. Á. Serrano, F.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Scalable Content-Addressable Network Lintao Liu
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
The Crossroads of Geography and Networks Michael T. Goodrich Dept. of Computer Science w/ David Eppstein, Kevin Wortman, Darren Strash, and Lowell Trott.
Geometry of large networks (computer science perspective) Dmitri Krioukov (CAIDA/UCSD) AIM, November 2011.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Ad Hoc Networking Course Instructor: Carlos Pomalaza-Ráez Geographical Routing Using Partial Information for Wireless Ad Hoc Networks Rahul Jain, Anuj.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
Navigability of Networks Dmitri Krioukov CAIDA/UCSD M. Boguñá, M. Á. Serrano, F. Papadopoulos, M. Kitsak, A. Vahdat, kc claffy May, 2010.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
Ad Hoc Wireless Routing COS 461: Computer Networks
Scalability of Routing: Compactness and Dynamics Dmitri Krioukov (CAIDA) Kevin Fall (Intel Research) and kc claffy (CAIDA) IETF-67.
A Node-Centric Load Balancing Algorithm for Wireless Sensor Networks Hui Dai, Richar Han Department of Computer Science University of Colorado at Boulder.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
On Optimal Geographic Routing in Wireless Networks with Holes and Non-Uniform Traffic Sundar Subramanian, Sanjay Shakkottai and Piyush Gupta INFOCOM 2007.
A Small World Model for Improving Robustness of Heterogeneous Networks Diansong Luo, Tie Qiu*, Nakema Deonauth, Aoyang Zhao Presenter: Tie Qiu (PhD, Associate.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Data Center Network Architectures
GPSR Greedy Perimeter Stateless Routing
Sensor Network Routing
Greedy Routing with Bounded Stretch
Department of Computer Science University of York
2nd TERANET 2011 International Workshop co-located with DISC 2011
Presentation transcript:

1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M. Boguñá, A. Vahdat

2 Outline Model of scale-free networks embedded in hyperbolic metric spaces Greedy forwarding in the model Conclusion Motivation

Routing overhead is a serious scaling limitation in many networks (Internet, wireless, overlay/P2P networks, etc.) Search for infinitely scalable routing without any overhead Do not propagate any information about changing topology Route without any global topology knowledge, using only local information How is it possible? 3

Greedy geometric forwarding as routing using only local information Network topology is embedded in a geometric space To reach a destination, each node forwards the packet to the neighbor that is closest to the destination in the space 4

5 Hidden space visualized

Desired properties of greedy forwarding, and related metrics Property 1: Greedy routes should never get stuck at local minima, nodes that do not have any neighbor closer to the destination than themselves Success ratio, percentage of successful greedy paths reaching their destinations, should be close to 1 Property 2: Greedy paths should be close to shortest paths Stretch, ratio of the lengths of greedy to shortest paths, should be also close to 1 Property 3: Even if topology changes, success ratio and stretch should stay close to 1 without any recomputation (e.g., without nodes changing their positions in the space) 6

Problem formulation (high-level) Find a combination of network topology and underlying geometric space which would satisfy these desired properties Any suggestions? Nature offers some: many dynamic networks in nature and society do route information without any topology knowledge (brain, regulatory, social networks, etc.) All these complex networks have power-law degree distributions (scale-free) and strong clustering (many triangular subgraphs) Let’s focus on these topologies (which, luckily, also characterize the Internet and P2P networks) But what about the underlying space? 7

Conjecture: space is hyperbolic Nodes in real complex networks can often be classified hierarchically Hierarchies are tree-like structures Hyperbolic geometry is the geometry of tree-like structures Formally: trees embed almost isometrically in hyperbolic spaces, not in Euclidean ones 8

9 Main hyperbolic property: the exponential expansion of space Circle length and disc area grow with their radius R as ~ e R They are exactly 2  sinh R 2  (cosh R  1) The numbers of nodes in a tree at or within R hops from the root grow as ~ b R where b is the tree branching factor The metric structures of hyperbolic spaces and trees are essentially the same

Problem formulation (low-level) Verify the conjecture: check if hyperbolic geometry, in the simplest possible settings, can naturally give rise to scale-free, strongly clustered topologies Check if greedy forwarding satisfies the desired properties in the resulting embedding 10

11 Outline Motivation Greedy forwarding in the model Conclusion Model of scale-free networks embedded in hyperbolic metric spaces

12 The model

13 The model (cont.)

14

15 Average node degree at distance r from the disc center

16 Node degree distribution

17 Model vs. AS Internet

Growing networks The model can be adjusted for networks growing in hyperbolic spaces All results stay the same 18

19 Outline Motivation Model of scale-free networks embedded in hyperbolic metric spaces Conclusion Greedy forwarding in the model

20 Two greedy forwarding algorithms Original Greedy Forwarding (OGF): select closest neighbor to destination, drop the packet if no one closer than current hop Modified Greedy Forwarding (MGF): select closest neighbor to destination, drop the packet if a node sees it twice

21 Property 1: success ratio

22 Property 2: average and maximum stretch

23 Property 3: Robustness of greedy forwarding w.r.t. network dynamics Scenario 1: Randomly remove a percentage of links and compute the new success ratio Scenario 2: Remove a link and compute the percentage of paths that were going through it and are still successful (that is, the percentage of paths that found a by-pass)

24 Percentage of successful paths (dynamic networks, scenario 1)

25 Percentage of successful paths (dynamic networks, scenario 2)

Shortest paths in scale-free graphs and hyperbolic spaces 26

27 Outline Motivation Model of scale-free networks embedded in hyperbolic metric spaces Greedy forwarding in the model Conclusion

Conclusion (low-level) Hyperbolic geometry naturally explains the two main topological characteristics of complex networks scale-free degree distributions strong clustering Greedy forwarding in complex networks embedded in hyperbolic spaces is exceptionally efficient 28

Conclusion (mid-level) Complex network topologies are naturally congruent with hyperbolic geometries Greedy paths follow shortest paths that approximately follow geodesics in the hyperbolic space Both topology and geometry are tree-like This congruency is robust w.r.t. topology dynamics There are many link/node-disjoint shortest paths between the same source and destination that satisfy the above property Strong clustering (many by-passes) boosts up the path diversity If some of shortest paths are damaged by link failures, many others remain available, and greedy routing still finds them 29

Conclusion (high-level) To efficiently route without topology knowledge, the topology should be both hierarchical (tree-like) and have high path diversity (not like a tree) Complex networks do borrow the best out of these two seemingly mutually-exclusive worlds Hidden hyperbolic geometry naturally explains how this balance is achieved 30

Implications Greedy forwarding mechanisms in these settings may offer virtually infinitely scalable information dissemination (routing) strategies for communication networks Zero communication costs (no routing updates!) Constant routing table sizes (coordinates in the space) No stretch (all paths are shortest, stretch=1) 31

Applications Internet routing (hard): need to reverse the problem and find an embedding for a given Internet topology first Overlay networks: with underlay (easier; examples: existing P2P): have freedom of constructing a name space and its embedding according to the model, so that all the desired properties are satisfied without underlay (harder; examples: CCN, pocket switching): need to make sure that the underlay network topology and its dynamics are congruent with the overlay name space and its dynamics 32