Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.

Slides:



Advertisements
Similar presentations
Topology Modeling via Cluster Graphs Balachander Krishnamurthy and Jia Wang AT&T Labs Research.
Advertisements

Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Graphs COP Graphs  Train Lines Gainesville OcalaDeltona Daytona Melbourne Lakeland Tampa Orlando.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
CP3397 Network Design and Security Lecture 4 WAN design - Principles and practice.
The Connectivity and Fault-Tolerance of the Internet Topology
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Measuring the Internet in real time. Scott Kirkpatrick, Systems Group (HUJI), and EVERGROW partners: DIMES (TAU) and ETOMIC (Budapest, Navarra)
The Internet’s Dynamic Geography Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem and EVERGROW Collaborators (thanks, not blame…)
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
Analysis of BGP Routing Tables
AITIA International Inc. and Lorand Eotvos University, Budapest ROBUST NETWORKS FROM LOCAL OPTIMIZATION A Bottom-Up Model to Generate Networks with Skewed.
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
The Internet as a computing surface Avogadro-scale Computing MIT, April 17, 2008 Scott Kirkpatrick Hebrew University of Jerusalem and CBA, MIT.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Near-Deterministic Inference of AS Relationships Udi Weinsberg A thesis submitted toward the degree of Master of Science in Electrical and Electronic Engineering.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
The Internet’s Physical Topology (or, Will the Internet ever measure itself?)‏ Scott Kirkpatrick, School of Engineering, Hebrew University of Jerusalem.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
The Internet Is Like A Jellyfish
The Erdös-Rényi models
Measuring and Analyzing Networks Scott Kirkpatrick Hebrew University of Jerusalem April 12, 2011.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MOTIA FINAL CONFERENCE ''Project Presentation” “Interdependency at the Physical and IP Levels” Wp1 and Wp2 With the support of the Prevention, Preparedness.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Chapter 3. Community Detection and Evaluation May 2013 Youn-Hee Han
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Network Community Behavior to Infer Human Activities.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Graph theory and networks. Basic definitions  A graph consists of points called vertices (or nodes) and lines called edges (or arcs). Each edge joins.
Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Informatics tools in network science
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
Maximizing Ad-Hoc network lifetime Yael Ochbaum Orit Varsano Supervised by Michael Segal.
Network Layer Routing Networks: Routing.
ICMP ICMP – Internet Control Message Protocol
COMP 3270 Computer Networks
Peer-to-Peer Information Systems Week 6: Performance
Network Layer Routing Networks: Routing.
Lecture 9: Network models CS 765: Complex Networks
Presentation transcript:

Jellyfish, and other Interesting creatures Of the Internet Scott Kirkpatrick, Hebrew University with Avishalom Shalit, Sorin Solomon, Shai Carmi, Eran Shir, and Yuval Shavitt 8 August, 2005 Copyright, Pixar, Inc. 2003

DIMES – Internet topology map Previous efforts to measure the Internet have used: –One machine + Traceroute to many destinations –Many* machines, specially deployed to traceroute to many destinations * Many <= 50 because of management headaches Sites restricted to academic or gov’t labs, on network backbone General perception was that Law of Diminishing Returns has set in seems to have made a breakthroughhttp:// –Don’t manage machines, offer a very lightweight, limited purpose client, and collect its measurements centrally 100 – 1000 clients via word-of-mouth (Sep04 to April05) 1000 – 5000 clients achieved via press, slashdot, still in the geek community –(May05 -- ?) 5000 – clients in the general public by offering services in return –Somewhere in the client range, we have the network monitoring itself, and the possibility that it can also manage itself in real time.

AS map for July 2005 BGP nodes edges = 4.44 DIMES nodes edges = ,862 edges 24,182 in both maps 35,952 new edges 11,858 edges + 81,672 edges > 7.80

Exploring the DIMES AS-graph We consider the Internet at the level of its autonomous systems (ASes) Previous studies have used degree as indicator to decompose networks –In particular, the Faloutsos’ “jellyfish model” Identify core of network as maximal clique (not a robust criterion) Shells around network labeled by hop count from core (a small world) Find that sites with few links often connect to those with high degree We consider longer-range connectivity, using k-pruning. K-core, K-shell, and K-crusts result –K-shell is “derivative” of K-core, K-crust is union of K-shells –Near power-law structure of a new “inflow” region is observed –K-shells are not connected, but K-crusts have a giant cluster For Erdos-Renyi graphs, K-core is w.h.p. K-connected. For scale free? Result – focus attention on the capabilities of the inflow region, in support of P2P, chat, local traffic. Next steps – reachability is much harder than percolation.

How does original degree map into k-shell?

AS K-shell decomposition

IP K-shell decomposition

K-shell decomposition

K-crusts show percolation threshold Data from  These are the hanging tentacles of our (Red Sea) Jellyfish Largest cluster in each shell

The K-core is at least K-connected

Now offering: monthly public stats

K-shell for network visualization Using LaNet-Vi

Michalis Faloutsos’ Jellyfish Highly connected nodes form the core Each Shell: adjacent nodes of previous shell, except 1- degree nodes Importance decreases as we move away from core 1-degree nodes hanging The denser the 1-degree node population the longer the stem Core Shells 1 2 3

Meduza (מדוזה) model In January, the inner core was at K = 30, but this picture persists to the present day, when core is >40. The precise definition of the tendrils: those sites isolated from the largest cluster in all the crusts – they connect only to the core.

Links per site of k-shells to k-core (above) and to k-crust (below)

Where do the links go in Medusa? Early shells (1-10) link to intermediate shells as well as to the core.

Average distance between sites in a crust

Random scale-free graphs produce the same structure Seen in both Barabasi-style and Molloy-Reed models of scale free networks

Next steps New data permits reexamining the clustering behavior –Much data not seen in previous BGP-based studies –This is the major deviation from simple random models –Analyze as a function of k-shell, instead of simply degree Reachability is not percolation, but can be evaluated –Decision to transmit a message depends on sender and destination, not simply on the existence of a link –Cost of evaluating uphill-downhill reachability is comparable to shortest path

Preliminary reachability data (std data set)

Now add sideways steps at top of path

Now restrict to the 20-crust

Sideways step less effective inside crust