The Workshop on Internet Topology (WIT) Report ACM SIGCOMM Computer Communication Review Volume 37, Issue 1 (January 2007) Dmitri Krioukov CAIDA Fan Chung.

Slides:



Advertisements
Similar presentations
Hidden Metric Spaces and Navigability of Complex Networks
Advertisements

All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Geometry of large networks (computer science perspective) Dmitri Krioukov (CAIDA/UCSD) AIM, November 2011.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Traffic Engineering With Traditional IP Routing Protocols
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
CPSC 695 Future of GIS Marina L. Gavrilova. The future of GIS.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
1 Network Topology Measurement Yang Chen CS 8803.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
© 2009 AT&T Intellectual Property. All rights reserved. Multimedia content growth: From IP networks to Medianets Cisco-IEEE ComSoc Webinar. Sept. 23, 2009.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
RSBM Business School Research in the real world: the users dilemma Dr Gill Green.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Quantifying the Causes of Path Inflation Neil Spring, Ratul Mahajan, and Thomas Anderson Presented by Luv Kohli COMP November 24, 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
MOTIA FINAL CONFERENCE ''Project Presentation” “Interdependency at the Physical and IP Levels” Wp1 and Wp2 With the support of the Prevention, Preparedness.
ITEC224 Database Programming
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
A Case Study in Understanding OSPFv2 and BGP4 Interactions Using Efficient Experiment Design David Bauer†, Murat Yuksel‡, Christopher Carothers† and Shivkumar.
RR-FS Status Report Dmitri Krioukov CAIDA IETF-60.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
P2P Interaction in Socially Intelligent ICT David Hales Delft University of Technology (Currently visiting University of Szeged, Hungary)
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
An Optimization-Driven Approach for Modeling AS-level Internet Connectivity Presented by: Hyunseok Chang Joint work with Sugih Jamin.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA 3 rd CAIDA-WIDE Workshop.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
Lecture №4 METHODS OF RESEARCH. Method (Greek. methodos) - way of knowledge, the study of natural phenomena and social life. It is also a set of methods.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Statistica /Statistics Statistics is a discipline that has as its goal the study of quantity and quality of a particular phenomenon in conditions of.
Working at a Small-to-Medium Business or ISP – Chapter 6
Backbone Traffic Engineering
Working at a Small-to-Medium Business or ISP – Chapter 6
Presentation transcript:

The Workshop on Internet Topology (WIT) Report ACM SIGCOMM Computer Communication Review Volume 37, Issue 1 (January 2007) Dmitri Krioukov CAIDA Fan Chung UCSD kc claffy CAIDA Marina Fomenkov CAIDA Alessandro Vespignani Indiana University Walter Willinger AT&T Research

What we need to know to understand Internet Topology As and router level topology generation mechanisms. Degree based methods (PLRG, BA, BRITE, BT, INET) Structural methods (GT-ITM) Canonical topologies General model of Random Graphs (GRG) Power law Random Graph (PLRG)

Outline Motivation of different people interested in this area Different models Different way for data collection Open Problems Recommendations

Motivation networking researchers what a node or a link represents physically meaningful topologies ie router-level connectivity logical constructs such as AS-level topology, or overlay networks such as the WWW graph, graph, P2P networks how new technologies, policies, or economic conditions will impact the Internet’s connectivity structure at different layers. physicists Internet is just one of many examples of a complex network. Physicists search for inherent principles shaping small and large- scale network patterns. They want to find universal laws on application domains.

Motivation Mathematicians Internet topology analysis, having mathematicians involved will stimulate the development of suitable mathematical apparatuses. Engineers need understand the Internet structure since performance of several applications and protocols depends strongly on peculiarities of an underlying network. Ex: Recent research suggests that observed Internet-like topologies are particularly well-structured for routing efficiency (A. Brady and L. Cowen, “Compact routing on power-law graphs with additive stretch,” in ALENEX, ) but the existing Internet routing architecture does not exploit this efficiency. The knowledge and understanding of the topological properties of the Internet should help engineers to optimize future technological developments.

Data Mathematicians do not need data at all Physicists are interested in data to support their models, but are not especially concerned much about the data quality They both rely on Networking community Engineers are the closest to collecting actual data, at least about their own networks. However, data ownership and stewardship are complex and highly charged issues with numerous social, political, liability, and security implications. It is the responsibility of all data users to educate themselves on the incompleteness, inaccuracy, and other deficiencies of these measurements and to avoid over interpretation.

Data Collection Techniques Simulation technique for random graph generator Router level graph –Trace route over months, over different monitoring points to collect data WHOIS database –Whois databases enable you to search for information about the people, computers, organizations, and name servers. top-level domains ".com", ".net", and ".org" can be searched from their online database ie. - Search domain names using partial word(s) in Domain Search. - Partial word(s) searching on active domain names ("bill gates") - IP address searching (" ") - Full domain ( nameintel.com goes directly to whois)

Data Collection Techniques What is AS? – IP with common Routing policies What is BGP? - organizations can run BGP using private AS numbers to an ISP that connects all those organizations to the Internet BGP data collection (Autonomous Systems AS level graph) –BGP tables are collected from Oregon route Server, this connects to the various ISP for collecting BGP table. –The ability to infer AS peering relationship, from BGP routing tables depends largely on inter-AS business contracts. If a business contract does not permit a given inter-AS route to be used by a third party, BGP does not advertise this information to the global Internet. –Internet Routing Registry (IRR) databases

Models Static - constructing statistical ensembles of random networks with certain characteristics matching values measured in the real Internet. Dynamic - trying to reproduce the details of the Internet evolution/growth Networking researchers –descriptive in the sense of matching certain graph- theoretic properties –provide context for known structural or architectural features of Internet Physicists and Mathematicians –Lets leave it

(OPEN PROBLEMS) better Internet topology data Incompleteness of the data –classical Erd˝os-R´enyi random graphs, are extremely unlikely to represent real Internet topologies measured from multiple vantage points –inference of probability distributions specifying possible quantitative deviations of real topologies from measured ones remains largely an open problem –lack of observation points, finite number of destinations probed, inability to capture other layers and disambiguate between high-degree nodes and opaque clouds We need targeted measurements focused on particular geographic areas. Existing measurement tools have not demonstrated the ability to scale up to measure link and/or node properties across realistic networks Internet measurement would ideally progress from measuring only the intra- and inter-AS topology at the router- and AS-level (“An empirical approach to modeling inter-AS traffic matrices,” in IMC, 2005.)

(OPEN PROBLEMS) Modeling Descriptive models strive to reproduce some graph- theoretic properties of the Internet and usually are not concerned with their network-specific interpretation. (“The Internet AS-level topology: Three data sources and one definitive metric,” Computer Communication Review, vol. 36, no. 1, ) explanatory models acknowledge domain-specific constraints (traffic conditions, cost-minimization requirements, technological reality ) while attempting to simulate the fundamental principles and factors responsible for the structure and evolution of network topology. But which factors are critical is open problem.

(OPEN PROBLEMS) Modeling Future developments in the field of Internet modeling may include the following advancements –Annotated models of an ISP’s router-level topology, where nodes are labeled with router capacity, type, or role, and link labels describe delay, distance, or bandwidth; –annotated models of the Internet’s AS-level topology, where node labels include AS-specific information, e.g., number and/or locations of PoPs, customer base, and link labels reflect peering relationships –models built around parameters closely related to real use of the network, e.g., routing models that define and utilize routing- related parameters such as robustness, fairness, outage, etc. –dynamic, evolutionary models of the Internet deriving simple rules for network evolution from actual technological constraints, e.g., from known Cisco router characteristics.

(OPEN PROBLEMS) General Theory Internet is complex engineered system because At the AS level, the Internet topology is a result of local business decisions independently made by each AS On the other hand, at the router level the Internet topology is a product of human- controlled technological optimizations aiming to minimize cost and maximize efficiency

(OPEN PROBLEMS) General Theory Traditional graph theory is not suitable for dealing with dynamic network structures that change over time. Multiple layers in the Internet protocol stack have their own corresponding topologies, i.e., fiber, optical, router, AS,Web, P2P graphs, that describe significantly different aspects of Internet connectivity.(Multiscale Modelling and Simulation, Springer, Berlin, 2004 ) Need to development of new approaches, techniques, and tools for measuring or inferring, AS related traffic. Interplay political, social, economical, technological diversity –For example, is the router-level topology of a large Korean ISP different because of their atypically high penetration of broadband deployment, or importance of gaming traffic? –small Chinese Internet AS-level topology preserves the structural characteristics of the global Internet (Chinese Internet AS-level topology,” 2006, arXiv:cs.NI/ )

RECOMMENDATIONS Interdisciplinary communication remains a serious bottleneck, important to read, try to understand, and cite publications from other fields A lack of comprehensive and high-quality topological and traffic data represents a serious obstacle to successful Internet topology modeling, and especially model validation. –outreach to Internet registries, e.g., ARIN, RIPE, and other databases regarding access and use of their data for research purposes; –develop new techniques and tools to collect the data for the next generation of Internet models –Concentrate on robustness –support repositories of publicly available topology and traffic data DatCat - facilitate sharing of data sets with researchers in pursuit of more reproducible scientific results ( convert theoretical results into practical solutions Can a GENI-like facility help in tackling some of the research challenges identified in this report, and if so, how?