The Internet Is Like A Jellyfish



Similar documents
Analysis of Internet Topologies

Analysis of Internet Topologies: A Historical View

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Internet Topology. Yihua He Michalis Faloutsos University of California, Riverside. Glossary 2.

Jellyfish: A Conceptual Model for the AS Internet Topology

Introduction to LAN/WAN. Network Layer

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

Inet-3.0: Internet Topology Generator

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Towards Modelling The Internet Topology The Interactive Growth Model

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Quality of Service Routing Network and Performance Evaluation*

Performance of networks containing both MaxNet and SumNet links

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Network traffic: Scaling

Routing in packet-switching networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Stability of QOS. Avinash Varadarajan, Subhransu Maji

Virtual Landmarks for the Internet

THE UNIVERSITY OF AUCKLAND

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

Exterior Gateway Protocols (BGP)

Social Networks and Social Media

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Detecting Network Anomalies. Anant Shah

Some Examples of Network Measurements

Distance Degree Sequences for Network Analysis

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Routing Protocols (RIP, OSPF, BGP)

BGP Routing Stability of Popular Destinations

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Definition. A Historical Example

2004 Networks UK Publishers. Reprinted with permission.

Network Level Multihoming and BGP Challenges

Traffic Engineering & Network Planning Tool for MPLS Networks

Social Media Mining. Network Measures

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Large-Scale IP Traceback in High-Speed Internet

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Structural constraints in complex networks

MPLS VPN Security Best Practice Guidelines

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

Route Discovery Protocols

CS335 Sample Questions for Exam #2

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Demonstrating the high performance and feature richness of the compact MX Series

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Outline. Outline. Outline

Reordering of IP Packets in Internet

IP Network Monitoring and Measurements: Techniques and Experiences

Search Heuristics for Load Balancing in IP-networks

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

International Journal of Advanced Research in Computer Science and Software Engineering

An Efficient Load Balancing Technology in CDN

Dmitri Krioukov CAIDA/UCSD

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

On Routing Asymmetry in the Internet

Transcription:

The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU)

Big Picture: Modeling the Internet Topology Traffic Protocols Routing, Congestion Control Measure and model each component Identify simple properties and patterns Model and simulate their interactions Michalis Faloutsos 2

The Goal of Internet Modeling A real Internet instance Power-law: Frequency of degree vs. degree Find simple fundamental properties Understand why they appear and their effects Michalis Faloutsos 3

Claim: We Need The Right Tools This is just not effective We need to get some chains The Far Side -- G. Larson Michalis Faloutsos 4 4

The World Wide Web is a Bow-Tie In Strongly connected out Core In Out Tendrils Captures several properties [WWW[ WWW-Tomkins et al] The components are of comparable size Michalis Faloutsos 5

The Accuracy-Intuition Space Of Models Intuition high low Naive Ideal trend Clueless Complex low Accuracy high More tools Self-similarity Power-laws Wavelets Eigenvalues less intuition Something a human can picture Is it a real conflict? Michalis Faloutsos 6

Why Do We Need an Intuitive Model? Human mind is simple Visualizable: : creates a mental picture Memorable: captures the main properties Maximizes information/effort ratio Makes you think Michalis Faloutsos 7

What does the Internet look like? Can I develop a simple model of the AS Internet topology that I can draw by hand? Can I identify a sense of hierarchy in the network? Focus: Autonomous Systems topology and data from NLANR Michalis Faloutsos 8

Possible Topological Models Furball (One-degree nodes are at the periphery) Broom (Military Hierarchy) Donut (Circular connectivity: Around the earth?) Michalis Faloutsos 9

An Intuitive Model : The Internet Topology as Jellyfish Shells 1 2 3 Core Highly connected nodes form the core Each Shell: adjacent nodes of previous shell, except 1-degree 1 nodes Importance decreases as we move away from core 1-degree nodes hanging The denser the 1-degree 1 node population the longer the stem Michalis Faloutsos 10

Roadmap Identify a Hierarchy Define the Importance of a node Present topological properties Present the jellyfish model Why is the jellyfish a good model? Conclusions Appendix: Latest News on power-laws for the Internet topology Michalis Faloutsos 11

How Can We Develop a Simple Model? We need an anchor and a compass Anchor: We need a starting point in the network Compass: We want to classify nodes according to importance Michalis Faloutsos 12

Defining the Importance of a Node The topological importance has many aspects Degree: : number of adjacent nodes Eccentricity: : the maximum distance to any other node Significance: : Significant nodes are near : 1. many nodes 2. significant nodes Michalis Faloutsos 13

Significance of a Node The significance of a node is the sum of the significance of its neighbors. The iterative procedure converges At each round, total significance is normalized to 1 [Kleinberg 96] 96]: the eigenvector of the max eigenvalue of the adjacency matrix This is equivalent to [Kleinberg Relative Significance: Signif.. times No. Nodes Relative Significance = 1, fair share of significance Michalis Faloutsos 14

Roadmap Identify a Hierarchy Defining the Importance of a node Present topological properties Present the jellyfish model Why is the jellyfish a good model? Conclusions Michalis Faloutsos 15

Observation 1: Significance and Eccentricity Are Correlated Significance Eccentricity Significant nodes have low eccentricity Intuitively, significant nodes are in the middle of the network [Global Internet 01] Michalis Faloutsos 16

Observation 2: Many One-Degree Nodes Connect to High-Degree Nodes Number of 1-degree neighbors The failure of Furball model One-degree nodes are scattered everywhere The distribution of one-degree nodes follows a powerlaw Order of decreasing neighbors Michalis Faloutsos 17

Observation 3: The Internet Premise: One Robust Connected Network Size of Largest Connected Component 4000 3000 2000 1000 Random Highest Degree first order Highest Significance first order 0 0 332 664 996 1328 1660 1992 2324 2656 2988 #Deleted nodes Iterations Robust to random, sensitive to focused failures The network tends to stay as one connected component Michalis Faloutsos 18

Observation 4: The Number of Alternate Paths Between Two Nodes Number of paths The Failure of the Donut Model Path Length All alternate paths go through the same direction No shortcuts or loop-arounds Michalis Faloutsos 19

Roadmap Identify a Hierarchy Defining the Importance of a node Present topological properties Present the jellyfish model Why is the jellyfish a good model? Conclusions Michalis Faloutsos 20

Defining a Hierarchy Recursively Define the core: Maximal clique of highest degree node Define the Layers: All nodes adjacent to previous layer Define the Shells: A layer without its one-degree nodes Michalis Faloutsos 21

The Internet Topology as a Jellyfish Shells 1 2 3 Core Core: : High-degree clique Shell: : adjacent nodes of previous shell, except 1-degree nodes 1-degree nodes: : shown hanging The denser the 1-1 degree node population the longer the stem Michalis Faloutsos 22

The Hierarchy: The Model Respects the Node Importance 8 6 4 2 0-2 -4 Core Layer- 1 Eff Eccentricity Log Relative Significance Log Degree Layer- 2 Layer- 3 Layer- 4 Layer- 5 The importance of nodes decreases as we move away from the core The effective eccentricity decreases by one in each layer (see paper for details) -6 Michalis Faloutsos 23

The Evolution of the Jellyfish % of total graph 40 35 30 25 20 15 10 5 0 Core Hang-0 8/ 11/ 1997 4/ 30/ 1998 8/ 1/ 1998 11/ 30/ 1998 4/ 30/ 1999 7/ 15/ 1999 10/ 10/ 1999 Jun-00 Shell1 Hang-1 Shell2 shell/hang Hang-2 Shell3 Hang-3 Shell4 Hang-4 The structure of the jellyfish has not changed much in 1997-2000 Nodes become more connected: Small increase in shells and decrease in hanging nodes Michalis Faloutsos 24

The Diameter Remains Constant Percentage of nodes reached 6 5 4 Hops 6 hops reach approximately 98% of the network! The jellyfish diameter remains the same Time Michalis Faloutsos 25

Theory Supports the Jellyfish! A surprising theoretical result [Reittu A network with powerlaw degree -> > jellyfish Reittu Norros 03] Assume degree powerlaw and random connections The network will have a clique of high degree nodes The diameter of the network is O(log logn)! In total aggrement with our observations Michalis Faloutsos 26

Why Is The Jellyfish a Good Model? It s s cute, in addition Michalis Faloutsos 27

The Jellyfish Captures Many Properties The network is compact: 99% of pairs of nodes are within 6 hops There exists a highly connected center Clique of high degree nodes There exists a loose hierarchy: Nodes far from the center are less important One-degree nodes are scattered everywhere The network has the tendency to be one large connected component Michalis Faloutsos 28

And It Looks Like A Jellyfish Independent Observation Router Level Topology Produced by CAIDA Michalis Faloutsos 29

Conclusions We model the Internet as a jellyfish The jellyfish represents graphically several topological properties Network is compact We can identify a center We can define a loose hierarchy The network tends to be one connected component Theoretical results support our observations http://www.cs.ucr.edu/~michalis www.cs.ucr.edu/~michalis/ Michalis Faloutsos 30

My Other Research Interests 1. Characterize and model network behavior: Poisson and Long Range Dependence [GI 02 - Globecom] 2. Model and simulate the Internet topology Identify structure and hierarchy [GI 01] [COMNET*] 3. Model and simulate BGP Large scale simulations (10,000 nodes) [GI 02] 4. Wireless networks Improving TCP over ad hoc networks [Globecom[ 02] Multicast: supporting scalability and QoS (Cui Gerla) Efficient management through overlay trees [Globecom[ 02]+ PeerNet) [IPTPS 03] 5. Multicast: supporting scalability and 6. A novel network layer: DART (PeerNet( Michalis Faloutsos 31

Appendix: Latest News on Power-laws The Internet topology can be described by power-laws [Faloutsos x 3, SIGCOMM 99] The power-laws are here to stay Appear consistently over five years Even with newer more complete data [Infocom 02] Michalis Faloutsos 32

Powerlaw: : Degree Exponent D RouteViews - NLANR Data Newer More Complete AS graph Degree distribution of nodes: CCDF It holds even for the more complete graph: 99% Michalis Faloutsos 33

Thank you! http://www.cs.ucr.edu/~michalis www.cs.ucr.edu/~michalis/ Michalis Faloutsos 34

Eigenvalues of the Topology 1 2 0 1 1 A = 1 0 0 3 1 0 0 Let A be the adjacency matrix of graph The eigenvalue λ is real number s.t.: A v = λ v, where v some vector Eigenvalues are strongly related to topological properties More details in Part B Michalis Faloutsos 35

Power-law: Eigen Exponent E Eigenvalue Exponent = slope E = -0.48 May 2001 Rank of decreasing eigenvalue Find the eigenvalues of the adjacency matrix Eigenvalues in decreasing order (first 100) Michalis Faloutsos 36

Surprising Result! Exponent E is half of exponent D Theorem: Given a graph with relatively large degrees d i then with high probability: Eigenvalue λ i = d i,, where i rank of decreasing order Thus, if we compare the slope of the plot the eigenvalues and the degrees: log λ i = 0.5 log d i [Fabrikant, Koutsoupias, Papadimiitriou in STOC 01] [Mihail Papadimitriou Random 02] Michalis Faloutsos 37

Time Evolution of The Topology Powerlaws are here to stay Degree distribution slope is invariant Network becomes denser The rich get richer phenomenon Michalis Faloutsos 38

The Number of ASes in Time 13 K 3 K 1997 2002 The number of AS doubled in two years Growth seems to slow down! Michalis Faloutsos 39

Degree Distribution Did Not Change! Slope is practically constant for over 3 years Michalis Faloutsos 40

The Topology Becomes Denser! Recall six degrees of separation 6 hops reach approximately 98% of the network! Denser: 6 hops reach more nodes Michalis Faloutsos 41

The Rich Get Richer The increase of the degree versus the initial degree New connections prefer highly connected nodes Michalis Faloutsos 42

That s s it! Thank you! http://www.cs.ucr.edu/~michalis www.cs.ucr.edu/~michalis/ Michalis Faloutsos 43

I. Power-law: rank exponent R degree Exponent = slope R = -0.74 R Rank: nodes in decreasing degree order The plot is a line in log-log scale [Faloutsos, Faloutsos and Faloutsos SIGCOMM 99] Dec 98 Michalis Faloutsos 44

I. Estimations Using With Rank Exponent R Lemma: Given the nodes N, and an estimate for the rank exponent R, we predict the edges E: 1 1 Ε = (1 R+ 2( R + 1) N ) 1 N Michalis Faloutsos 45

Some Current Results Measuring the performance of real-time applications E2e performance is asymmetric (by 10) Estimating Long Range Dependence No definitive estimating method exists SELFIS software tool for performance analysis A study of BGP routing robustness Persistence and prevalence of paths Paths are fairly robust, but there is a lot of noise too A data repository: 107Gb, 1 billion BGP paths Michalis Faloutsos 46

Measuring Real-time Performance Can the Internet support VoIP now? We conduct globe-wide experiments UCR, CMU, Japan, Australia, Greece Experimental set-up Approx. 6 4Kbit/sec sending rate Small packet sizes every 20, 30, 40, 50 msec,, 1 sec Michalis Faloutsos 47

How Many Distinct Paths Does an IP Prefix Use? 70% 30% Almost 70% of the IP prefixes have 2-10 distinct paths 30% of IP prefixes have only one path Michalis Faloutsos 48

For More Information www.cs.ucr.edu/~michalis/ Michalis Faloutsos 49

Routing Is Persistent 70% 70% of prefixes use one path continuously for 50% of their time! CDF of the relative duration of the most persistent path Michalis Faloutsos 50

Measurements: The Death of the Symmetry Assumption One-way delay: Forward can be 10 times higher than backward delay Michalis Faloutsos 51

Characterizing Network Behavior with Long Range Dependence LRD captures the memory of the behavior It is quantified by a single scalar number LRD appears in many aspects of networks Traffic load, arrival times, delays, packet loss Open Question: what does it really tell us? PROBLEM: We do not know how to calculate LRD! Many estimators with conflicting estimates No systematic approach Michalis Faloutsos 52

The Intuition Behind LRD Capturing the dependency of the signal to its previous values White Noise Pink Noise Brownian Noise Michalis Faloutsos 53

Idea: Reverse Engineering LRD Develop a library of behaviors to know data Three Series of Tests for the Estimators 1. Evaluating the accuracy of the estimators Synthetic Fractional Gaussian Noise (FGN) 2. Deceiving the estimators with non-lrd data Periodicity, Noise, Trend 3. Applying the estimators in real data Characterizing delay and packet loss Michalis Faloutsos 54

BGP Routing Analysis Overarching Goal: Develop a realistic detailed model for large scale realistic simulations Now: A study of BGP routing robustness Persistence and prevalence of paths Stability of advertisements Next step: Study the customer-provider relationships Michalis Faloutsos 55

Using Massive BGP Routing Data We use data from NLANR for almost 3 years Late 1997 to early 2001 Daily snapshots of BGP routing tables Created a database to facilitate path queries 107Gb of data, 1 billion BGP paths Michalis Faloutsos 56

Overview of Results for BGP Routing Stable and persistent routing with some noise 44% prefixes are advertised for < 30 days 50% prefixes have a dominant path 84% of time 35% of prefixes use one path continuously for 90% of their time! Significant path multiplicity due to traffic engin. Michalis Faloutsos 57

Graph Reduction Tools Large Small Reduce Reduce: large real graph to small realistic graph Achieve 70% reduction Satisfy degree distribution, but increases diameter Michalis Faloutsos 58

The Jellyfish Captures Direction of Connectivity 8/ 11/ 1997 4/ 30/ 1998 8/ 1/ 1998 11/ 30/ 1998 4/ 30/ 1999 7/ 15/ 1999 10/ 10/ 1999 Jun-00 45 40 35 30 25 20 15 10 5 0 Most edges are between layers 80% Less edges are within a layer 20% Layer Michalis Faloutsos 59

The Model Respects the Node Importance 7 6 5 4 3 2 1 Effective Eccentricity Log Relative Significance Log Degree The importance of each layer decreases as we move away from the core 0-1 -2-3 Core Shell-1 Shell-2 Shell-3 Shell-4 Michalis Faloutsos 60

Intuitive Models Are Useful Cons: Danger of oversimplification Pros: Memorable Visualizable Maximizing information/effort ratio They can be very useful when exploring unknown territory Even disproving a wrong model is progress! Michalis Faloutsos 61