Topology Modeling: First-Principles Approach Aditya Akella Supplemental Slides 03/30/2007.

Slides:



Advertisements
Similar presentations
Abilene and Internet2 Engineering Update Guy Almes Terena Networking Conference 2002 Limerick, Ireland Guy Almes Terena Networking Conference 2002 Limerick,
Advertisements

Topologies of Complex Networks Functions vs. Structures Lun Li Advisor: John C. Doyle Co-advisor: Steven H. Low Collaborators: David Alderson (NPS) Walter.
1 International IP Backbone of Taiwan Academic Networks Wen-Shui Chen & Yu-lin Chang APAN-TW APAN 2003 Academia Sinica Computing Center, Taiwan.
High Performance Internet Service at the University of Michigan December 1999 Internet2 These slides are available from the U-M I2 Web page:
Network Measurements Session Introduction Joe Metzger Network Engineering Group ESnet Eric Boyd Deputy Technology Officer Internet2 July Joint.
HY-483 Presentation On power law relationships of the internet topology A First Principles Approach to Understanding the Internet’s Router-level Topology.
High Performance Internet Service at the University of Michigan April 2000 Internet2 These slides are available from the U-M I2 Web page:
Copyright 2007 CENIC and PNWGP TransitRail: Nationwide Commodity Peering Program February 12, 2007 Minneapolis, MN.
The Connectivity and Fault-Tolerance of the Internet Topology
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
15-744: Computer Networking L-14 Network Topology.
Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
ACM SIGCOMM LSAD Workshop, Kyoto, Japan, August 27, 2007 Minimizing Collateral Damage by Proactive Surge Protection Jerry Chou, Bill Lin University of.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
A Comparison of Layering and Stream Replication Video Multicast Schemes Taehyun Kim and Mostafa H. Ammar.
Network Design IS250 Spring 2010 John Chuang. 2 Questions  What does the Internet look like? -Why do we care?  Are there any structural invariants?
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
1 Dong Lu, Peter A. Dinda Prescience Laboratory Department of Computer Science Northwestern University Evanston, IL GridG: Synthesizing Realistic.
Jerry Chou and Bill Lin University of California, San Diego
A First-Principles Approach to Understanding the Internet’s Router-level Topology 2004 ACM SIGCOMM Portland, OR.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
CS 268: Computer Networking L-14 Network Topology.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
USENIX Security Symposium, San Jose, USA, July 30, 2008 Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
National LambdaRail (NLR): Progress Report Tom West President/CEO, CENIC.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
Edge Based Cloud Computing as a Feasible Network Paradigm(1/27) Edge-Based Cloud Computing as a Feasible Network Paradigm Joe Elizondo and Sam Palmer.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
1 Optical Research Networks WGISS 18: Beijing China September 2004 David Hartzell NASA Ames / CSC
Subnet Level Internet Topology Generator Mehmet Burak AKGUN CS790 Complex Networks.
Confidential and propriety 2006 Quilt Peering Survey Results.
Modeling Internet Topology Kenneth L. Calvert Matthew B. Doar Ellen W. Zegura Presented by Kiran Komaravolu.
The Science of Complex Networks and the Internet: Lies, Damned Lies, and Statistics Walter Willinger AT&T Labs-Research
Overview of the vBNS and Other Related Initiatives Dr. Samir Chatterjee CIS Department Georgia State University
OSCARS Overview Path Computation Topology Reachability Contraints Scheduling AAA Availability Provisioning Signalling Security Resiliency/Redundancy OSCARS.
The Workshop on Internet Topology (WIT) Report ACM SIGCOMM Computer Communication Review Volume 37, Issue 1 (January 2007) Dmitri Krioukov CAIDA Fan Chung.
1 Spectral Analysis of Power-Law Graphs and its Application to Internet Topologies Milena Mihail Georgia Tech.
1 ESnet Update Joint Techs Meeting Minneapolis, MN Joe Burrescia ESnet General Manager 2/12/2007.
Delivering Circuit Services to Researchers: The HOPI Testbed Rick Summerhill Director, Network Research, Architecture, and Technologies, Internet2 Joint.
Copyright 2004 National LambdaRail, Inc N ational L ambda R ail Update 9/28/2004 Debbie Montano Director, Development & Operations
Measurement, Modeling and Analysis of the Internet Wang Xiaofei Vishal Misra, Columbia University.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
The Geography and Evolution of the European Internet Infrastructure Sandra Vinciguerra URU – Utrecht University
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
Abilene update IBM Internet2 Day July 26, 2001 Steve Corbató Director of Backbone Network Infrastructure.
1 Role of Ethernet in Optical Networks Debbie Montano Director R&E Alliances Internet2 Member Meeting, Apr 2006.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Internet2/Abilene Perspective Guy Almes and Ted Hanss Internet2 Project NASA Ames -- August 10, 1999.
National LambdaRail, Inc – Confidential & Proprietary National LambdaRail 4/21/2004 Debbie Montano light the future N L.
Abilene Update SC'99 :: Portland :: 17-Nov-99. Outline Goals Architecture Current Status NGI Peering International Peering Multicast.
TransPAC-Pacific Wave 100G
Internet2. Yesterday’s Internet  Thousands of users  Remote login, file transfer  Applications capitalize on underlying technology.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
J. Bunn, D. Nae, H. Newman, S. Ravot, X. Su, Y. Xia California Institute of Technology US LHCNet LHCNet WG September 12 th 2006.
Next Generation Abilene
The Future of Regional Networking Tempe, AZ February 12, 2008
Infrastructure Update
Abilene Update Rick Summerhill
Presentation transcript:

Topology Modeling: First-Principles Approach Aditya Akella Supplemental Slides 03/30/2007

Evaluate performance of protocols Protect Internet Resource provisioning Understand large scale networks Why Topology Modeling Challenges Large Size Real topologies are not publicly available Incredible variability in many aspects

Trends in Topology Modeling Observation Modeling Approach Real networks are not random, but have obvious hierarchy. Structural models (GT-ITM Calvert/Zegura, 1996) Long-range links are expensive Random graph models (Waxman, 1988) Internet topologies exhibit power law degree distributions (Faloutsos et al., 1999) Degree-based models replicate power-law degree sequences

A few nodes have lots of connections Rank R(d) Degree d Source: Faloutsos et al. (1999) Power Laws and Internet Topology Router-level graph & Autonomous System (AS) graph Led to active research in degree-based network models Most nodes have few connections R(d) = P (D>d) x #nodes

Degree-Based Models of Topology Expected Degree Sequence –Based on random graph models that skew probability distribution to produce power laws in expectation –Examples: Power Law Random Graph (PLRG), Generalized Random Graph (GRG) Preferential Attachment –Growth by sequentially adding new nodes –New nodes connect preferentially to nodes having more connections –Examples: Inet, GPL, AB, BA, BRITE, CMU power-law generator

Features of Degree-Based Models Degree sequence follows a power law (by construction) High-degree nodes correspond to highly connected central “ hubs ”, which are crucial to the system Achilles ’ heel: robust to random failure, fragile to specific attack Preferential AttachmentExpected Degree Sequence

Li et al. Consider the explicit design of the Internet –Annotated network graphs (capacity, bandwidth) –Technological and economic limitations –Network performance Seek a theory for Internet topology that is explanatory and not merely descriptive. –Explain high variability in network connectivity –Ability to match large scale statistics (e.g. power laws) is only secondary evidence

Degree Bandwidth (Gbps) 15 x 10 GE 15 x 3 x 1 GE 15 x 4 x OC12 15 x 8 FE Technology constraint Total Bandwidth Bandwidth per Degree Router Technology Constraint Cisco GSR, circa 2002 high BW low degree high degree low BW

approximate aggregate feasible region Aggregate Router Feasibility core technologies edge technologies older/cheaper technologies

Rank (number of users) Connection Speed (Mbps) 1e-1 1e-2 1 1e1 1e2 1e3 1e4 1e211e4 1e6 1e8 Dial-up ~56Kbps Broadband Cable/DSL ~500Kbps Ethernet Mbps Ethernet 1-10Gbps most users have low speed connections a few users have very high speed connections high performance computing academic and corporate residential and small business Variability in End-User Bandwidths

Heuristically Optimal Topology Hosts Edges Cores Mesh-like core of fast, low degree routers High degree nodes are at the edges.

SOX SFGP/ AMPATH U. Florida U. So. Florida Miss State GigaPoP WiscREN SURFNet Rutgers U. MANLAN Northern Crossroads Mid-Atlantic Crossroads Drexel U.U. Delaware PSC NCNI/MCNCMAGPI UMD NGIX DARPA BossNet GEANT Seattle Sunnyvale Los Angeles Houston Denver Kansas City Indian- apolis Atlanta Wash D.C. Chicago New York OARNET Northern Lights Indiana GigaPoP Merit U. Louisville NYSERNet U. Memphis Great Plains OneNet Arizona St. U. Arizona Qwest LabsUNM Oregon GigaPoP Front Range GigaPoP Texas TechTulane U. North Texas GigaPoP Texas GigaPoP LaNet UT Austin CENICUniNet WIDE AMES NGIX Pacific Northwest GigaPoP U. Hawaii Pacific Wave ESnet TransPAC/APAN Iowa St. Florida A&M UT-SW Med Ctr. NCSA MREN SINet WPI StarLight Intermountain GigaPoP Abilene Backbone Physical Connectivity (as of December 16, 2003) Gbps Gbps Gbps Gbps

Metrics for Comparison: Network Performance Given realistic technology constraints on routers, how well is the network able to carry traffic? Step 1: Constrain to be feasible Abstracted Technologically Feasible Region degree Bandwidth (Mbps) Step 3: Compute max flow BiBi BjBj x ij Step 2: Compute traffic demand

PAPLRG/GRGHOT Structure Determines Performance P(g) = 1.19 x P(g) = 1.64 x P(g) = 1.13 x 10 12

Likelihood-Related Metric Easily computed for any graph Depends on the structure of the graph, not the generation mechanism Measures how “hub-like” the network core is Define the metric( d i = degree of node i ) For graphs resulting from probabilistic construction (e.g. PLRG/GRG), LogLikelihood (LLH)  L(g) Interpretation: How likely is a particular graph (having given node degree distribution) to be constructed?

L max l(g) = 1 P(g) = 1.08 x P(g) Perfomance (bps) PA PLRG/GRG HOT Abilene-inspiredSub-optimal l(g) = Relative Likelihood