Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks Power law graphs Small world graphs.
Advertisements

Topologies of Complex Networks Functions vs. Structures Lun Li Advisor: John C. Doyle Co-advisor: Steven H. Low Collaborators: David Alderson (NPS) Walter.
Scale Free Networks.
HY-483 Presentation On power law relationships of the internet topology A First Principles Approach to Understanding the Internet’s Router-level Topology.
The Connectivity and Fault-Tolerance of the Internet Topology
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Models of Network Formation Networked Life NETS 112 Fall 2013 Prof. Michael Kearns.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
Network Design IS250 Spring 2010 John Chuang. 2 Questions  What does the Internet look like? -Why do we care?  Are there any structural invariants?
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
AITIA International Inc. and Lorand Eotvos University, Budapest ROBUST NETWORKS FROM LOCAL OPTIMIZATION A Bottom-Up Model to Generate Networks with Skewed.
Topology Modeling: First-Principles Approach Aditya Akella Supplemental Slides 03/30/2007.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Network analysis and applications Sushmita Roy BMI/CS 576 Dec 2 nd, 2014.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Systems Biology, April 25 th 2007Thomas Skøt Jensen Technical University of Denmark Networks and Network Topology Thomas Skøt Jensen Center for Biological.
Computer Science 1 Web as a graph Anna Karpovsky.
Attack-Resistant Networks Allen G. Taylor Communication networks have four primary objectives: Minimize.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
The Erdös-Rényi models
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
NTU GICE Intentional Attacks on Complex Network Speaker: Shin-Ming Cheng Advisor: Kwang-Cheng Chen.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al. Hammad Iqbal CS April 2006.
Measurement, Modeling and Analysis of the Internet Wang Xiaofei Vishal Misra, Columbia University.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
Complex network of the brain II Hubs and Rich clubs in the brain
Class 9: Barabasi-Albert Model-Part I
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
LECTURE 2 1.Complex Network Models 2.Properties of Protein-Protein Interaction Networks.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
March 3, 2009 Network Analysis Valerie Cardenas Nicolson Assistant Adjunct Professor Department of Radiology and Biomedical Imaging.
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Scale-free and Hierarchical Structures in Complex Networks L. Barabasi, Z. Dezso, E. Ravasz, S.H. Yook and Z. Oltvai Presented by Arzucan Özgür.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Network (graph) Models
Lecture 23: Structure of Networks
Data Center Network Architectures
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Complex Networks: Connectivity and Functionality
Lecture 23: Structure of Networks
Peer-to-Peer and Social Networks Fall 2017
Peer-to-Peer and Social Networks
Lecture 23: Structure of Networks
Presentation transcript:

Internet Topology Caterina Scoglio KSU

Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at different levels of detail Distributed nature of Internet (thousands of smaller networks) no complete picture of the whole topology Discover Internet Topology

Which Topology are they studying? Internet Topology at router level for a single ISP ISP are designed in isolation and connected by engineering and business considerations

Random Models Georgia Tech Internetwork Topology Models (GT-ITM). this model places nodes at random in a two-dimensional space and adds links probabilistically between each pair of nodes in a manner that is inversely proportional to their distance

Why random models are not good They do not consider nonrandom structure of Internet, particularly hierarchy and locality, as part of the network design

Powel Law Models heavy-tailed distributions in node degree heavy-tailed distributions conform to power-law distributions scale free network

Scale Free Networks In scale-free networks,  some nodes = highly connected hubs" (high degree),degree  most nodes are of low degree. Scale-free networks' structure and dynamics are independent of the the number of nodes. In other words, a network that is scale-free will have the same properties no matter what the number of its nodes is.nodes Their most distinguishing characteristic is that their degree distribution follows a power law relationship degree distributionpower law P(k)=k -  where the coefficient γ may vary approximately from 2 to 3 for most real networks.

Comparison Between random and Scale-free Networks

Robustness of Scale Free Networks Prof. Barabási and his colleagues point out that hub based networks are vulnerable to attack. From this, they conclude that the Internet, which they consider being a hub based network, is also vulnerable to attack on a relatively small collection of hub node.

Need for better models Recent work has shown that the perspective offered from the degree-based models is both incomplete and can sometimes be misleading or even flawed. Robustness example

Understanding Internet Topology: Principles, Models, and Validation IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER David Alderson, Lun Li, Walter Willinger, and John C. Doyle.

How is the new study performed Using a “First Principles Approach”  Networking Technology  Economic of Network Design Metrics used for comparison  Performance Inspired  Likelihood related

Networking Technology There is an inherent tradeoff between the number of physical link connections (i.e., node degree) and connection speeds (i.e., bandwidth) at each router. Core routers tend to specialize in supporting the highest available link speeds, but can only handle a relatively few such connections. Access routers are designed to support many more connections (but at necessarily lower speeds). This contradicts the basic characteristic of Scale Free network, with hub nodes with high degree, at least in the core network

Economic of Network design Based on the high variability in population density, it is expected that there exists high variability in network connectivity. However, the latter is by and large due to the connectivity observed at the network’s edge and cannot possibly be the result of the connectivity pattern typically encountered in the network core This supports the thesis that the access topology can be described as a Power Law Topology

Metrics Used for Comparison Performance Inspired  measurement for how different networks handle the same traffic demand matrix. Likelihood related  to differentiate between networks (raw connectivity structures) modeled by simple and connected graphs having the same vertex set and the same degree There is an explicit relationship between graphs with high values of s(g) and graphs having a “hub-like” core (i.e., high connectivity vertices forming a cluster in the center of the network).

Heuristically Optimal Topologies (HOT) core is constructed as a sparsely connected mesh of high-speed, low-connectivity routers which carry heavily aggregated traffic over high- bandwidth links. Accordingly, this mesh-like core is supported by a hierarchical tree-like structure at the edges whose purpose is to aggregate traffic through high connectivity

Comparison Five networks having the same node degree distribution: identical from a degree-based perspective, but opposites in terms of engineering performance. Preferential Attachment (PA): nodes are added successively and connected to the existing graph with probability proportional to each existing node’s current degree HOT

Performances

HOT model HOT network is not only more robust to worst- case deletions (here, worst-case are low- connectivity core nodes), but also shows high tolerance to deleting other nodes, particularly high-degree edge routers. The scale-free network has such poor nominal performance to start with, it is worse intact than the HOT network after the latter has sustained substantial damage.

Robustness to random failures or fragility to targeted attacks the presence of high-connectivity nodes in the core of the network (power laws) attacks on them can destroy network connectivity as a whole Contradicts Internet’s legendary and most clearly understood robustness property, namely its ability, in the presence of router or link failures, to “see damage and work around it”

Robust yet Fragile “robust yet fragile” nature of the Internet’s actual router-level topology is provided in [J. C. Doyle, D. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R.Tanaka, and W. Willinger, “The “robust yet fragile” nature of the Internet,”Proc. Nat. Acad. Sci., vol. 102, no. 41, pp – 14502, 2005.

Robustness robustness to router failures, defining this robustness as the remaining performance of the network after routers are removed and after rerouting of traffic residual performance after successive deletion of worst-case nodes (deleting the worst 20 vertices corresponds to removing 20% of the routers)

1. SFnet vs. HOTnet and the real Internet

Internet Robustness Internet is simple and robust because of:  a layered architecture  multiple forms of feedback control that enable robust performance in the presence of frequent disruptions and enormous heterogeneity.