1 / 64

CS 268: Computer Networking

CS 268: Computer Networking. L-14 Network Topology. Sensor Networks. Structural generators Power laws HOT graphs Graph generators Assigned reading On Power-Law Relationships of the Internet Topology A First Principles Approach to Understanding the Internet’s Router-level Topology.

gwidon
Download Presentation

CS 268: Computer Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 268: Computer Networking L-14 Network Topology

  2. Sensor Networks • Structural generators • Power laws • HOT graphs • Graph generators • Assigned reading • On Power-Law Relationships of the Internet Topology • A First Principles Approach to Understanding the Internet’s Router-level Topology

  3. Outline • Motivation/Background • Power Laws • Optimization Models • Graph Generation

  4. Why Study Topology? • Correctness of network protocols typically independent of topology • Performance of networks critically dependent on topology • e.g., convergence of route information • Internet impossible to replicate • Modeling of topology needed to generate test topologies

  5. AT&T AT&T MCI SPRINT MCI SPRINT Internet Topologies Autonomous System (AS) level Router level

  6. More on Topologies ... • Router level topologies reflect physical connectivity between nodes • Inferred from tools like traceroute or well known public measurement projects like Mercator and Skitter • AS graph reflects a peering relationship between two providers/clients • Inferred from inter-domain routers that run BGP and public projects like Oregon Route Views • Inferring both is difficult, and often inaccurate

  7. Hub-and-Spoke Topology • Single hub node • Common in enterprise networks • Main location and satellite sites • Simple design and trivial routing • Problems • Single point of failure • Bandwidth limitations • High delay between sites • Costs to backhaul to hub

  8. Simple Alternatives to Hub-and-Spoke • Dual Hub-and-Spoke • Higher reliability • Higher cost • Good building block • Levels of Hierarchy • Reduce backhaul cost • Aggregate the bandwidth • Shorter site-to-site delay …

  9. Critical Evolution of the Internet • NSFNet • 1st Gen (1985): 56 kbps /LSI-11s, six SC centers • 2nd Gen (1988): T1/IBM RTs, SC sites + regional nets • 3rd Gen (1991): T3/RS6000; Migration to MCI PoPs • 1993: Commercialization plan; NSF phase out by 4/95; NCSA Mosaic • 1994-1995: Privatization of the NSFNet, ISP connectivity, Network Access Point (NAP) Architecture • 1995- : vBNS, Internet2, Abilene • WWW, Netscape • Telecommunications Act of 1996 • Massive mergers yielding giants like SBC, MCI-Worldcom-Sprint, AT&T-TCI, AOL-Time Warner, and new service providers like Qwest

  10. BBN team that implemented the interface message processor The ARPANet • Paul Baran • RAND Corp, early 1960s • Communications networks that would survive a major enemy attack • ARPANet: Research vehicle for “Resource Sharing Computer Networks” • 2 September 1969: UCLA first node on the ARPANet • December 1969: 4 nodes connected by phone lines SRI 940 Utah PDP 10 IMPs UCSB IBM 360 UCLA Sigma 7

  11. Digex Backbone Qwest IP Backbone (Late 1999) GTE Internetworking Backbone Various Research and Commercial Backbones

  12. Abilene Internet2 Backbone

  13. Intermountain GigaPoP U. Memphis Indiana GigaPoP WiscREN OARNET Great Plains Front Range GigaPoP U. Louisville NYSERNet StarLight Arizona St. NCSA Iowa St. Qwest Labs U. Arizona UNM Oregon GigaPoP WPI Pacific Wave Pacific Northwest GigaPoP SINet SURFNet ESnet MANLAN U. Hawaii GEANT Rutgers U. WIDE MREN UniNet MAGPI CENIC Northern Crossroads 0.1-0.5 Gbps 0.5-1.0 Gbps 1.0-5.0 Gbps 5.0-10.0 Gbps TransPAC/APAN AMES NGIX Tulane U. LaNet SOX North Texas GigaPoP U. Delaware Drexel U. DARPA BossNet Texas GigaPoP Mid-Atlantic Crossroads Texas Tech SFGP/ AMPATH Miss State GigaPoP UT Austin NCNI/MCNC U. Florida UMD NGIX UT-SW Med Ctr. U. So. Florida Florida A&M Northern Lights Merit OneNet Kansas City Indian- apolis Denver Chicago Seattle New York Wash D.C. Sunnyvale Los Angeles Atlanta Houston PSC Abilene Backbone Physical Connectivity (as of December 16, 2003)

  14. Metropolitan Area Exchanges/Network Access Points Tier 1 Connections: High speed FDDI switches + routers with huge routing tables Tier 2 Connections: regional connection points MAE does not provide peering, just connection b/w to co-located ISPs

  15. Points-of-Presence (PoPs) • Inter-PoP links • Long distances • High bandwidth • Intra-PoP links • Short cables between racks or floors • Aggregated bandwidth • Links to other networks • Wide range of media and bandwidth Inter-PoP Intra-PoP Other networks

  16. Deciding Where to Locate Nodes and Links • Placing Points-of-Presence (PoPs) • Large population of potential customers • Other providers or exchange points • Cost and availability of real-estate • Mostly in major metropolitan areas • Placing links between PoPs • Already fiber in the ground • Needed to limit propagation delay • Needed to handle the traffic load

  17. Trends in Topology Modeling Observation • Long-range links are expensive • Real networks are not random, but have obvious hierarchy • Internet topologies exhibit power law degree distributions (Faloutsos et al., 1999) • Physical networks have hard technological (and economic) constraints. Modeling Approach • Random graph (Waxman88) • Structural models (GT-ITM Calvert/Zegura, 1996) • Degree-based models replicate power-law degree sequences • Optimization-driven models topologies consistent with design tradeoffs of network engineers

  18. Waxman Model (Waxman 1988) • Router level model • Nodes placed at random in 2-d space with dimension L • Probability of edge (u,v): • ae-d/(bL), where d is Euclidean distance (u,v), a and b are constants • Models locality u d(u,v) v

  19. Real World Topologies • Real networks exhibit • Hierarchical structure • Specialized nodes (transit, stub, ...) • Connectivity requirements • Redundancy • Characteristics incorporated into the Georgia Tech Internetwork Topology Models (GT-ITM) simulator (E. Zegura, K.Calvert, M.J. Donahoo, 1995)

  20. Transit-Stub Model (Zegura 1997) • Router level model • Transit domains • Placed in 2-d space • Populated with routers • Connected to each other • Stub domains • Placed in 2-d space • Populated with routers • Connected to transit domains • Models hierarchy

  21. So… Are We Done? • No! • In 1999, Faloutsos, Faloutsos, Faloutsos published a paper, demonstrating power law relationships in Internet graphs • Specifically, the node degree distribution exhibited power laws That Changed Everything…..

  22. Outline • Motivation/Background • Power Laws • Optimization Models • Graph Generation

  23. Power Laws in AS Level Topology

  24. Power Laws and Internet Topology Most nodes have few connections A few nodes have lots of connections Source: Faloutsos et al. (1999) Rank R(d) R(d) = P (D>d) x #nodes Degree d • Router-level graph & Autonomous System (AS) graph • Led to active research in degree-based network models

  25. GT-ITM Abandoned ... • GT-ITM did not give power law degree graphs • New topology generators and explanation for power law degrees were sought • Focus of generators to match degree distribution of observed graph

  26. Inet (Jin 2000) • Generate degree sequence • Build spanning tree over nodes with degree larger than 1, using preferential connectivity • randomly select node u not in tree • join u to existing node v with probability d(v)/d(w) • Connect degree 1 nodes using preferential connectivity • Add remaining edges using preferential connectivity

  27. 2 1 1 Power Law Random Graph (PLRG) • Operations • Assign degrees to nodes drawn from power law distribution • Create kv copies of node v; kv degree of v. • Randomly match nodes in pool • Aggregate edges may be disconnected, contain multiple edges, self-loops • Contains unique giant component for right choice of parameters

  28. 0.5 0.5 0.25 0.5 0.25 existing node new node Barabasi Model: Fixed Exponent • Incremental Growth • initially, m0 nodes • step: add new node i with m edges • Linear Preferential Attachment • connect to node i with probability ki / ∑ kj may contain multi-edges, self-loops

  29. Features of Degree-Based Models • Degree sequence follows a power law (by construction) • High-degree nodes correspond to highly connected central “hubs”, which are crucial to the system • Achilles’ heel: robust to random failure, fragile to specific attack Preferential Attachment Expected Degree Sequence

  30. Does Internet Graph HaveThese Properties? • No … (There is no Memphis!) • Emphasis on degree distribution - structure ignored • Real Internet very structured • Evolution of graph is highly constrained

  31. Problem With Power Law • ... but they're descriptive models! • No correct physical explanation, need an understanding of: • the driving force behind deployment • the driving force behind growth

  32. Outline • Motivation/Background • Power Laws • Optimization Models • Graph Generation

  33. Li et al. • Consider the explicit design of the Internet • Annotated network graphs (capacity, b/w) • Technological and economic limitations • Network performance • Seek a theory for Internet topology that is explanatory and not merely descriptive. • Explain high variability in network connectivity • Ability to match large scale statistics (e.g., power laws) is only secondary evidence

  34. 3 10 high BW low degree high degree low BW 2 10 1 10 Bandwidth (Gbps) 15 x 10 GE 15 x 3 x 1 GE 0 10 15 x 4 x OC12 15 x 8 FE Technology constraint -1 10 0 1 2 Degree 10 10 10 Router Technology Constraint Cisco 12416 GSR, circa 2002 Total Bandwidth Bandwidth per Degree

  35. core technologies approximate aggregate feasible region older/cheaper technologies edge technologies Aggregate Router Feasibility Source: Cisco Product Catalog, June 2002

  36. high performance computing academic and corporate residential and small business Variability in End-User Bandwidths 1e4 Ethernet 1-10Gbps 1e3 1e2 Ethernet 10-100Mbps Connection Speed (Mbps) a few users have very high speed connections 1e1 Broadband Cable/DSL ~500Kbps 1 1e-1 Dial-up ~56Kbps most users have low speed connections 1e-2 1e6 1 1e2 1e4 1e8 Rank (number of users)

  37. Hosts Heuristically Optimal Topology Mesh-like core of fast, low degree routers Cores High degree nodes are at the edges. Edges

  38. Given realistic technology constraints on routers, how well is the network able to carry traffic? Step 1: Constrain to be feasible Step 2: Compute traffic demand 1000000 100000 10000 Bj Abstracted Technologically Feasible Region 1000 Bandwidth (Mbps) 100 Step 3: Compute max flow xij 10 degree 1 10 100 1000 Bi Comparison Metric: Network Performance

  39. Likelihood-Related Metric • Easily computed for any graph • Depends on the structure of the graph, not the generation mechanism • Measures how “hub-like” the network core is • For graphs resulting from probabilistic construction (e.g. PLRG/GRG), LogLikelihood (LLH)  L(g) • Interpretation: How likely is a particular graph (having given node degree distribution) to be constructed? Define the metric (di = degree of node i)

  40. 12 10 11 10 10 10 0 0.2 0.4 0.6 0.8 1 l(g) = Relative Likelihood PA Abilene-inspired Sub-optimal PLRG/GRG HOT P(g) Perfomance (bps) Lmax l(g) = 1 P(g) = 1.08 x 1010

  41. Structure Determines Performance HOT PA PLRG/GRG P(g) = 1.13 x 1012 P(g) = 1.19 x 1010 P(g) = 1.64 x 1010

  42. Summary Network Topology • Faloutsos3[SIGCOMM99] on Internet topology • Observed many “power laws” in the Internet structure • Router level connections, AS-level connections, neighborhood sizes • Power law observation refuted later, Lakhina [INFOCOM00] • Inspired many degree-based topology generators • Compared properties of generated graphs with those of measured graphs to validate generator • What is wrong with these topologies? Li et al [SIGCOMM04] • Many graphs with similar distribution have different properties • Random graph generation models don’t have network-intrinsic meaning • Should look at fundamental trade-offs to understand topology • Technology constraints and economic trade-offs • Graphs arising out of such generation better explain topology and its properties, but are unlikely to be generated by random processes!

  43. Outline • Motivation/Background • Power Laws • Optimization Models • Graph Generation

  44. Graph Generation • Many important topology metrics • Spectrum • Distance distribution • Degree distribution • Clustering … • No way to reproduce most of the important metrics • No guarantee there will not be any other/new metric found important

  45. dK-Series Approach • Look at inter-dependencies among topology characteristics • See if by reproducing most basic, simple, but not necessarily practically relevant characteristics, we can also reproduce (capture) all other characteristics, including practically important • Try to find the one(s) defining all others

  46. 0K Average degree <k>

  47. 1K Degree distribution P(k)

More Related