Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures



Similar documents
Dmitri Krioukov CAIDA/UCSD

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

Routing with OSPF. Introduction

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Bioinformatics: Network Analysis

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Introduction to LAN/WAN. Network Layer

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Structural constraints in complex networks

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

How To Understand The Network Of A Network

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Router and Routing Basics

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Administrative Distance

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats


Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM)

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Protein Protein Interaction Networks

Scalable Source Routing

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS

O /27 [110/129] via , 00:00:05, Serial0/0/1

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

Based on Computer Networking, 4 th Edition by Kurose and Ross

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Chapter 10 Link-State Routing Protocols

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Complex Networks Analysis: Clustering Methods

Big Data Analytics CSCI 4030

Quality of Service Routing Network and Performance Evaluation*

On the effect of forwarding table size on SDN network utilization

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Exterior Gateway Protocols (BGP)

Masterkurs Rechnernetze IN2097

Network Load Balancing Using Ant Colony Optimization

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

The Graphical Method: An Example

CS Computer Networks 1: Routing Algorithms

A very short history of networking

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

6.263 Data Communication Networks

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Using OSPF in an MPLS VPN Environment

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

Lesson 5-3: Border Gateway Protocol

Introduction to Dynamic Routing Protocols

Routing Protocols (RIP, OSPF, BGP)

Link-State Routing Protocols

Practical Graph Mining with R. 5. Link Analysis

Reflection and Refraction

A discussion of Statistical Mechanics of Complex Networks P. Part I

For example, estimate the population of the United States as 3 times 10⁸ and the

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Layer 3 Routing User s Manual

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

Network-Wide Capacity Planning with Route Analytics

Configuring a Gateway of Last Resort Using IP Commands

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

Effects of node buffer and capacity on network traffic

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

The Internet Is Like A Jellyfish

Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Transcription:

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley

Problem High-level Routing is one of the most fundamental and yet most complex functions that networks perform Scalability of routing limits the scalability of future network designs and architectures that FIND seeks to explore Routing in harsh conditions (ad-hoc, sensor, etc., networks) scales poorly due to convergence requirements (even simulations cannot get beyond a few thousand nodes) Routing even in normal conditions (today s Internet!) also bears ominous scalability concerns, primarily with convergence, but also with routing table growth (IAB Routing Scalability Report, RFC4984) Until we solve the fundamental routing scalability problems, we cannot hope that our future network architectures will truly scale Low-level Routing to a destination requires knowing where it is Maintaining this knowledge in current Internet requires routers to continually propagate topology update messages [Korman and Peleg, 2006] show that the number of such messages cannot scale better than linearly with network size in the worst case [Krioukov et al, 2007] show that this worst case holds for observed Internet topologies Scalable routing for Internet-like topologies is impossible, until we learn to route without topology updates, i.e., without precise knowledge of the network topology

Main idea: greedy routing on hidden metric spaces as a possible solution How can we route if we do not know network topology? That s heresy! [Milgram, 1966] s experiments demonstrated that humans can efficiently route through the global acquaintance network topology knowing only some meta-information about their immediate neighbors and final destination It is true for other complex networks also! Social, biological, and communication networks, including the Internet, share the following peculiarities: scale-free: node degree distribution follows power law P(k)~k -γ with 2 γ 3 strong clustering: many triangular subgraphs Recent progress on compact routing in theoretical computer science achieves astonishing scalability of hierarchical routing on static scale-free graphs The above insights and discoveries led us to conjecture that the scale-free, strongly clustered structure of complex networks maximizes the efficiency of greedy routing guided by hidden metric spaces that underlie these networks Reconstruction of the hidden metric space underlying the real Internet would lead to an addressing architecture that allows for efficient and infinitely scalable routing without topology updates

How hidden metric spaces shape the network structure and function Overview The smaller the distance between two nodes in the hidden metric space (HMS), the more likely they are connected in the observable network. If node A is close to node B, and B is close to C in the hidden space, then A and C are necessarily close, and all three nodes are likely connected in the observable network. The geometry of the hidden space thus provides a natural explanation for clustering observed in many complex networks. The HMS also guides the greedy routing process: If node A wants to reach node F, it looks for which of its neighbors is closest to target F in the hidden space. Hidden distance CF is smaller than BF, therefore A forwards to C; node C performs similar calculations and selects its neighbor D as the next hop. Node D is directly connected to F; the resulting path is A C D F Concrete model To demonstrate the effect of HMSs on navigability of complex networks, we construct a network model in which the HMS is the simplest possible metric space a circle Our model has only two parameters: γ, the exponent of the power-law node degree distribution in the network; and α, which is, roughly, the strength of clustering in the network All nodes are uniformly distributed on the circle and Each pair of nodes in the network: have expected degrees k and k', drawn from probability distribution P(k)~k -γ are HMS-located at polar angles θ and θ' (hidden distance d(θ,θ')) on the circle are connected with the probability that decreases with the hidden distance d between them as 1/d α and increases with their expected degrees as (kk') α

Self-similarity of complex networks as the first evidence that hidden metric spaces do exist We discovered that degree distributions, correlations, and clustering in real complex networks, including the Internet, are self-similar w.r.t. a simple degree renormalization illustrated on the right In randomized versions of these networks degree distributions and correlations are still selfsimilar, but clustering is not k T - renormalization degree threshold k i - internal node degree in k T -subgraphs c - clustering Networks constructed by our HMS-model exhibit qualitatively similar effects, which suggests that Hidden metric spaces are a plausible explanation of self-similarity of complex networks w.r.t. degree renormalization, which is equivalent to hidden distance rescaling

Navigability of complex networks as the first evidence that greedy routing is efficient on the topologies of real networks We discovered that the topological properties of real complex networks correspond to the parameter values in our model (2.1 γ 2.6, α 1.5) that yield the most efficiently navigable networks in the greedy routing framework; this finding confirms that our main conjecture is plausible greedy routing architectures built on top of hidden metric spaces are efficient real networks may explicitly or implicitly evolve to increase their navigability Explanation of navigability of real networks specific values of γ (2.1 γ 2.6) correspond to exactly the densities of hubs (high-degree nodes) needed to interconnect all hidden distance scales, necessary for routing efficiency strong clustering (large α) ensures that orientation of links is congruent with the node degree hierarchy, i.e., most links connect the network core to the periphery navigable networks thus have a peculiar hierarchical structure congruent with the optimal layout of efficient greedy routing paths navigable region combination of γ and C for which ps increases with network size Internet AS-level topology from BGP RouteViews Web of trust PGP trust network Metabolic network of metabolic reactions of E. coli Airports global airport network

k-core decomposition of real and modeled networks Node coreness is a measure of how deep within the network core the node is located (the k-core is the maximal subgraph induced by nodes that have k or more connections to other nodes in the subgraph; and a node s coreness is k such that the k-core contains the node but the k+1-core does not) All nodes are color-coded based on their coreness and size-coded based on their degrees; higher-coreness nodes are also closer to circle centers The first row depicts two real networks: the AS-level Internet as seen by the Border Gateway Protocol (BGP) and the Pretty Good Privacy (PGP) social network of mutual trust relationships The rest of the rows show modeled networks for different values of power-law exponent γ in cases with strong (α=5.0) and weak (α=1.1) clustering The network size for all real and modeled cases is approximately 104 There is a remarkable similarity between real networks and modeled networks with γ=2.2 and α=5.0, i.e., with the most navigable parameter values Internet AS topology (BGP tables) Social trust network (PGP) Model with γ=2.2 and α=5.0 Model with γ=2.2 and α=1.1 Model with γ=2.5 and α=5.0 Model with γ=2.5 and α=1.1 Model with γ=3.0 and α=5.0 Model with γ=3.0 and α=1.1

Negative curvature as the main property of hidden metric spaces We discovered that Scale-free networks are congruent w.r.t. hidden hyperbolic geometries This congruency is robust w.r.t. network dynamics/evolution The high-level reason why HMSs are negatively curved Nodes in complex networks can often be hierarchically classified Hierarchies are (approximately) trees Trees embed almost isometrically in hyperbolic spaces Our specific findings are Hidden hyperbolic metric spaces explain, simultaneously, the scalefree degree distributions and strong clustering in complex networks Greedy routing mechanisms in these settings may offer virtually infinitely scalable routing algorithms for future communication networks Poincaré disc model of the hyperbolic plane: L i and P i are infinite straight lines Visualization of a modeled network Tessellation and tree embedding Successful paths Notations p s percentage of successful paths s 1 stretch of greedy paths w.r.t. shortest paths in the graph s 2,3 stretch of shortest and greedy paths w.r.t. lengths of hidden hyperbolic geodesics γ exponent of power-law degree distributions Original greedy gets stuck if no neighbor closer to the destination Modified greedy still forwards to the neighbor closest to the destination among all the neighbors and gets stuck if the packet loops As network topology changes, the greedy routing efficiency characteristics deteriorate very slowly For γ 2.5, removal of up to 10% of the links from the topology degrades the percentage of successful path by less than 1% Tessellation art Unsuccessful paths Node degree distributions in modeled networks and real Internet