A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Greedy Algorithms Greed is good. (Some of the time)
The Connectivity and Fault-Tolerance of the Internet Topology
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
1 Internet Path Inflation Xenofontas Dimitropoulos.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Graph Drawing Zsuzsanna Hollander. Reviewed Papers Effective Graph Visualization via Node Grouping Janet M. Six and Ioannis G. Tollis. Proc InfoVis 2001.
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
1 Dong Lu, Peter A. Dinda Prescience Laboratory Department of Computer Science Northwestern University Evanston, IL GridG: Synthesizing Realistic.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Computer Networks: Introduction1 Introduction. Computer Networks: Introduction2 Network Definitions and Classification Preliminary definitions and network.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Graph-based consensus clustering for class discovery from gene expression data Zhiwen Yum, Hau-San Wong and Hongqiang Wang Bioinformatics, 2007.
Subnet Level Internet Topology Generator Mehmet Burak AKGUN CS790 Complex Networks.
Network and the internet Part three Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Modeling Internet Topology Kenneth L. Calvert Matthew B. Doar Ellen W. Zegura Presented by Kiran Komaravolu.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
TCP Traffic and Congestion Control in ATM Networks
A Graph-based Friend Recommendation System Using Genetic Algorithm
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
LATA: A Latency and Throughput- Aware Packet Processing System Author: Jilong Kuang and Laxmi Bhuyan Publisher: DAC 2010 Presenter: Chun-Sheng Hsueh Date:
Februar 17, 2006GDS meeting - LIP1 MOve: an application-Malleable Overlay UIUC / INRIA Collaboration.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
The Influence of Network Topology on the Efficiency of QoS Multicast Heuristic Algorithms Maciej Piechowiak Piotr Zwierzykowski Poznan University of Technology,
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Reliable Multicast Routing for Software-Defined Networks.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
A configuration method for structured P2P overlay network considering delay variations Tomoya KITANI (Shizuoka Univ. 、 Japan) Yoshitaka NAKAMURA (NAIST,
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Network Simulation and Testing Polly Huang EE NTU
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Network Simulation and Testing Polly Huang EE NTU
 The Internet is the huge network of computers that links many different types of computers all over the world.  It is a network of networks that shares.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Part 2 of the paper Pavlin Radoslavov, Christos Papadopoulos,
1 Minimum Interference Algorithm for Integrated Topology Control and Routing in Wireless Optical Backbone Networks Fangting Sun Mark Shayman University.
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
The (k, l) Coredian Tree for Ad-Hoc Networks Department of Communication Systems Engineering, Ben-Gurion University of the Negev, 2008 Vladimir Katz Alex.
Classification of Networks
Data Center Network Architectures
Minimum Spanning Tree 8/7/2018 4:26 AM
Subnet Level Internet Topology Generator
Effective Replica Allocation
Introduction Wireless Ad-Hoc Network
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,

Introduction Internet has grown from the early research prototype to a global communications system that reaches most countries in the world. It has problems in routing, resource reservation, and administration. Simulating the Internet plays a vital role in attempting to address such problems. Conclusions reached about the suitability and performance of algorithms may vary depending on the methods used to model the network topology. An Autonomous System (AS) is a network under a single administrative authority (WAN). –The Internet can be considered as interconnected ASs with a multilevel hierarchy –Large ASs (e.g.,, Large Internet Service providers such as AT&T, UUNET,…) are reliable (When a few of nodes fail it still works - still connected, highly reliable). –We introduce  -reliability as a new metric to characterize and evaluate reliability. – We propose an efficient method for generating a network topology not only with basic properties: multilevel hierarchy, AS, lower average degree, and controllable (hop- diameter), but also with controllable  -reliability.

UUNET (AS) Backbone (3/6/2001) - Some nodes (NYC, SF…) form core, while others have been added step-by-step - We eliminate the leaves to get at the backbone. - Backbone has * Connectivity at least 2 * Longer links * Forms a mesh * highly reliable - Thus, we use connectivity of nonleaf backbone as a reliability metric: FIGURE 1

Approach If U is a subset of nodes of a network N, then the subnetwork induced by U is that network having node set U and link set consisting of all those links of N whose endpoints are in U. The  -backbone of N is, where V is the set of nodes of N, c the link capacity (modeled as distance, d the diameter of N, 0 <  < 1. –We remove one leaf node of the  -backbone at at time until there are no leaves left. –The resulting subnetwork (possibly empty) is a nonleaf  -backbone of the network N. –Finally, we define the connectivity of the nonleaf  -backbone of N to be the  -reliability of N. The  -reliability of the empty graph is –1. The  is chosen to be 0.12 in this study.

Our Method To generate networks that reflect the properties of the multilevel hierarchy, 3 or 4 hierarchy levels are structured, corresponding to global area networks, national area networks, MANs, or LANs respectively. To construct sub-networks of global area, national area, or MANs with the required  -reliability, the generation process begins at the top level in the hierarchy, and proceeds down to lowest level of the hierarchy. –First, the top level is generated in a W  H rectangle. –Next, we randomly generate a subnetwork at the next lower level within a smaller rectangle in a similar fashion. –Then, we replace each node of the preceding network of the higher level with a subnetwork. –Finally, the LANs are attached. We propose two generators, NBND–G for the global networks and NBND–N for the national networks.

Network at world level Network at nation level Net. at region level (MAN) Network at nation level Net. at region level (MAN) Net. at local level (LAN) Sender in NYCReceiver in Beijing

NBND-G Step 1----place C nodes randomly on a W  H rectangular area such that the Euclidean distance between any two nodes is not less than (W  W + H  H) 1/2 / 7. Then, the nodes are connected to each other to form a complete graph, which is the core of the backbone of the network generated. Step 2----let S be the integer part of 5 (T ­­– C – F) / 9. Place S nodes randomly and recursively on the W  H rectangular area such that the Euclidean distance from any current node is not less than (W  W + H  H) 1/2 / 10 and the added node is connected to the K distinct core nodes closer to it, but to the (K+1)th core node according to the probability 0.2. Step 3----place T – C – S – F nodes randomly and iteratively on the W  H rectangular area such that the Euclidean distance from any current node is not less than (W  W + H  H) 1/2 / 13 and the added node is connected to the K current distinct nodes closer to it, but to the (K+1)th node according to the probability 0.2. Step 4----place F nodes randomly and iteratively on the W  H rectangular area such that the Euclidean distance from any current node is not less than (W  W + H  H) 1/2 / 17. Then, the added node is connected to a current node closer to it. Step 5----let h be the integer part of N / 6. Repeat the preceding four steps within a W / 9  H / 9 rectangular area and with T = N, C = h + 1, and F = h to form a subnetwork of the national level. Then place a node of the subnetwork of the top level by the subnetwork such that the placed node overlaps a core node of the national level and each of some core nodes of the national level are connected to at least K nodes connected by the replaces node. Finally, repeat this process until all nodes of the top level have been done. Step 6----repeat the Step 5 with M and a W / 18  H / 18 rectangular area instead of N and the W / 9  H / 9 rectangular area respectively. Step 7----place each node of the subnetwork given through Step 6 by a LAN of L nodes which is modeled in a W / 35  H / 35 rectangular area as a tree topology such that the placed node overlaps one of the nodes of bigger degrees in the LAN.

A network of 1463 nodes generated by NBND-G with 0.12-reliability 2: FIGURE 2

NBND-N For NBND-N repeat steps 1 through 7, combining setps 5 and 6: (step 6 with M and a W / 18  H / 18 rectangular area instead of N in Step 5 and the W / 35  H / 35 rectangular area in Step 7 respectively). (302 nodes generated with 0.12-reliability 4 and red backbone) FIGURE 3

NBND-N 605 nodes with 0.12-reliability 2 and its backbone colored red: FIGURE 4

Visualization of the Models Our method is based on the placement of nodes on a plane and controls the size of each level of the hierarchical network. Through our free software, the generated network can be visualized. Source code and visualization code for NBND is available at /~cai /~cai

Examples from other models 30 network nodes generated by Tiers model [K. Caivert, M.B. Doar, and E.W. Zegura, Modeling Internet topology, IEEE Communication Magazine, June 1997,

Examples from other models 360 network nodes generated by Tiers model [K. Caivert, M.B. Doar, and E.W. Zegura, Modeling Internet topology, IEEE Communication Magazine, June 1997,

Examples from other models 100 network nodes generated by GT-ITM model [

Examples from other models 600 network nodes generated by GT-ITM model [

Conclusion In this paper we presented methods for generating network topologies with important properties, which reflects the basic topological structure of a large real network, or a collection of real networks such as the Internet. The generated networks have the reliability as we expect. Another contribution is the introduction of  -reliability as a new metric to characterize and evaluate the reliability of a real network. As the Internet is changing rapidly, one goal of our future work is to look for the metrics that can be used to quantitatively evaluate topology generators. –E.g., power laws reported in [11] were used for this purpose –but they were severely questioned by [15], which presented a thorough analysis on more complete data collected from various sources.

References Sally Floyd and Vern Paxson, Difficulties in simulating the Internet, to appear in IEEE/ACM Transactions on Networking, 2001, [2] Ellen W. Zegura, et al, A quantitative comparison of graph-based models for Internet topology, IEEE/ACM TRANSACTIONS ON NETWORKING, Vo l5, No 6, 1997, [3] Cheng jin et al, Inet,CSE-TR , [4] S. Keshav, Engineering Approach to computer Networks, Addison-Wesley, [5] CIADA, [6] B. M. Waxman, Routing of multipoint connections, IEEE JSAC, v6:9, [7] M. Doar, I. Leslie, How bad is naïve multicast muting, INFOCOM’ 93, [8] L. Wei and D. Estrin, The trade-offs of mutlicast trees and algorithms,” in Int. Conj Computer Communications and Networks Aug [9] M. B. Doar, A better model for generating test networks, Globecom ’96; Nov [10] K. Caivert, M.B. Doar, and E.W. Zegura, Modeling Internet topology, IEEE Communication Magazine, June 1997, [11] M. Faloutsos, P. Faloutsos, and C. Faloutsos, On power-law relationships of the Internet topology, Proc. SIGCOMM ’99, , Aug [12] G. Chartrand and L. Lesniak, Graphs & Digraphs, Wadsworth & Brooks [13] R. Siamwalla, R. Sharma, and S. Keshav, Discovering Internet Topology, [14] [15] Q. Chen et al, Origin of power laws in Internet topologies revisited, INFOCOM Source Code Source code for generator: NBND is available at /~caihttp:// /~cai