15-744: Computer Networking

14
1 15-744: Computer Networking L-14 Network Topology Sensor Networks Structural generators Power laws HOT graphs Graph generators Assigned reading On Power-Law Relationships of the Internet Topology A First Principles Approach to Understanding the Internet’s Router-level Topology 2 Outline Motivation/Background Power Laws Optimization Models Graph Generation 3 Why study topology? Correctness of network protocols typically independent of topology Performance of networks critically dependent on topology e.g., convergence of route information • Internet impossible to replicate Modeling of topology needed to generate test topologies 4

Transcript of 15-744: Computer Networking

Page 1: 15-744: Computer Networking

1

15-744: Computer Networking

L-14 Network Topology

Sensor Networks

• Structural generators

• Power laws

• HOT graphs

• Graph generators

• Assigned reading

• On Power-Law Relationships of the Internet

Topology

• A First Principles Approach to Understanding

the Internet’s Router-level Topology

2

Outline

• Motivation/Background

• Power Laws

• Optimization Models

• Graph Generation

3

Why study topology?

• Correctness of network protocols typically

independent of topology

• Performance of networks critically

dependent on topology

• e.g., convergence of route information

• Internet impossible to replicate

• Modeling of topology needed to generate

test topologies

4

Page 2: 15-744: Computer Networking

2

Internet topologies

AT&T

SPRINT MCI

AT&T

MCI SPRINT

Router level Autonomous System (AS) level

5

More on topologies..

• Router level topologies reflect physical connectivity

between nodes

• Inferred from tools like traceroute or well known public measurement projects like Mercator and Skitter

• AS graph reflects a peering relationship between two

providers/clients

• Inferred from inter-domain routers that run BGP and publlic

projects like Oregon Route Views

• Inferring both is difficult, and often inaccurate

6

Hub-and-Spoke Topology

• Single hub node

• Common in enterprise networks

• Main location and satellite sites

• Simple design and trivial routing

• Problems

• Single point of failure

• Bandwidth limitations

• High delay between sites

• Costs to backhaul to hub

7

Simple Alternatives to Hub-and-Spoke

• Dual hub-and-spoke • Higher reliability

• Higher cost

• Good building block

• Levels of hierarchy

• Reduce backhaul cost

• Aggregate the bandwidth

• Shorter site-to-site delay …

8

Page 3: 15-744: Computer Networking

3

Abilene Internet2 Backbone

9

SOX

SFGP/

AMPATH

U. Florida

U. So. Florida

Miss State

GigaPoP

WiscREN

SURFNet

Rutgers U.

MANLAN

Northern

Crossroads

Mid-Atlantic

Crossroads

Drexel U.

U. Delaware

PSC

NCNI/MCNC

MAGPI

UMD NGIX

DARPA

BossNet

GEANT

Seattle

Sunnyvale

Los Angeles

Houston

Denver

Kansas

City Indian-

apolis

Atlanta

Wash

D.C.

Chicago

New York

OARNET

Northern Lights

Indiana GigaPoP

Merit U. Louisville

NYSERNet

U. Memphis

Great Plains

OneNet Arizona St.

U. Arizona

Qwest Labs

UNM

Oregon

GigaPoP

Front Range

GigaPoP

Texas Tech

Tulane U.

North Texas

GigaPoP

Texas

GigaPoP

LaNet

UT Austin

CENIC

UniNet

WIDE

AMES NGIX

Pacific

Northwest

GigaPoP U. Hawaii

Pacific

Wave

ESnet

TransPAC/APAN

Iowa St.

Florida A&M UT-SW

Med Ctr.

NCSA

MREN

SINet

WPI

StarLight

Intermountain

GigaPoP

Abilene Backbone

Physical Connectivity (as of December 16, 2003)

0.1-0.5 Gbps

0.5-1.0 Gbps

1.0-5.0 Gbps

5.0-10.0 Gbps

10

Points-of-Presence (PoPs)

• Inter-PoP links

• Long distances

• High bandwidth

• Intra-PoP links

• Short cables between

racks or floors

• Aggregated bandwidth

• Links to other

networks

• Wide range of media

and bandwidth

Intra-PoP

Other networks

Inter-PoP

11

Deciding Where to Locate Nodes and Links

• Placing Points-of-Presence (PoPs)

• Large population of potential customers

• Other providers or exchange points

• Cost and availability of real-estate

• Mostly in major metropolitan areas

• Placing links between PoPs

• Already fiber in the ground

• Needed to limit propagation delay

• Needed to handle the traffic load

12

Page 4: 15-744: Computer Networking

4

Trends in Topology Modeling

Observation

• Long-range links are expensive

• Real networks are not random,

but have obvious hierarchy

• Internet topologies exhibit

power law degree distributions

(Faloutsos et al., 1999)

• Physical networks have hard technological (and economic)

constraints.

Modeling Approach

• Random graph (Waxman88)

• Structural models (GT-ITM

Calvert/Zegura, 1996)

• Degree-based models replicate

power-law degree sequences

• Optimization-driven models topologies consistent with design

tradeoffs of network engineers

13

Waxman model (Waxman 1988)

• Router level model

• Nodes placed at random

in 2-d space with

dimension L

• Probability of edge (u,v):

• ae^{-d/(bL)}, where d is

Euclidean distance (u,v), a

and b are constants

• Models locality

14

v

u d(u,v)

Real world topologies

• Real networks exhibit

• Hierarchical structure

• Specialized nodes (transit, stub..)

• Connectivity requirements

• Redundancy

• Characteristics incorporated into the

Georgia Tech Internetwork Topology Models

(GT-ITM) simulator (E. Zegura, K.Calvert

and M.J. Donahoo, 1995)

15

Transit-stub model (Zegura 1997)

• Router level model

• Transit domains

• placed in 2-d space

• populated with routers

• connected to each other

• Stub domains

• placed in 2-d space

• populated with routers

• connected to transit

domains

• Models hierarchy

16

Page 5: 15-744: Computer Networking

5

So…are we done?

• No!

• In 1999, Faloutsos, Faloutsos and

Faloutsos published a paper, demonstrating

power law relationships in Internet graphs

• Specifically, the node degree distribution

exhibited power laws

That Changed Everything…..

17

Outline

• Motivation/Background

• Power Laws

• Optimization Models

• Graph Generation

18

Power laws in AS level topology

19

• Faloutsos3 (Sigcomm’99)

• frequency vs. degree

Power Laws

topology from BGP tables of 18 routers 20

Page 6: 15-744: Computer Networking

6

• Faloutsos3 (Sigcomm’99)

• frequency vs. degree

Power Laws

topology from BGP tables of 18 routers 21

• Faloutsos3 (Sigcomm’99)

• frequency vs. degree

Power Laws

topology from BGP tables of 18 routers 22

• Faloutsos

• frequency vs.

degree

• empirical ccdf

P(d>x) ~ x-a

Power Laws

23

Power Laws

• Faloutsos3 (Sigcomm’99)

• frequency vs.

degree

• empirical ccdf

P(d>x) ~ x-a

1.15

24

Page 7: 15-744: Computer Networking

7

GT-ITM abandoned..

• GT-ITM did not give power law degree

graphs

• New topology generators and explanation

for power law degrees were sought

• Focus of generators to match degree

distribution of observed graph

25

Inet (Jin 2000)

• Generate degree sequence

• Build spanning tree over nodes

with degree larger than 1,

using preferential connectivity

• randomly select node u not in

tree

• join u to existing node v with

probability d(v)/ d(w)

• Connect degree 1 nodes using

preferential connectivity

• Add remaining edges using

preferential connectivity 26

Power law random graph (PLRG)

• Operations • assign degrees to nodes drawn from power law distribution

• create kv copies of node v; kv degree of v.

• randomly match nodes in pool

• aggregate edges

may be disconnected, contain multiple edges, self-loops

• contains unique giant component for right choice of parameters

27

2

1 1

Barabasi model: fixed exponent

• incremental growth

• initially, m0 nodes

• step: add new node i with m edges

• linear preferential attachment

• connect to node i with probability

(ki) = ki / kj

28

0.5

0.5 0.25

0.5 0.25

new node existing node

may contain multi-edges, self-loops

Page 8: 15-744: Computer Networking

8

Features of Degree-Based Models

• Degree sequence follows a power law (by construction)

• High-degree nodes correspond to highly connected central “hubs”, which are crucial to the system

• Achilles’ heel: robust to random failure, fragile to specific attack

29

Preferential Attachment Expected Degree Sequence

Does Internet graph have these properties?

• No…(There is no Memphis!)

• Emphasis on degree distribution - structure

ignored

• Real Internet very structured

• Evolution of graph is highly constrained

30

Problem With Power Law

• ... but they're descriptive models!

• No correct physical explanation, need an

understanding of:

• the driving force behind deployment

• the driving force behind growth

31

Outline

• Motivation/Background

• Power Laws

• Optimization Models

• Graph Generation

32

Page 9: 15-744: Computer Networking

9

Li et al.

• Consider the explicit design of the Internet

• Annotated network graphs (capacity,

bandwidth)

• Technological and economic limitations

• Network performance

• Seek a theory for Internet topology that is

explanatory and not merely descriptive.

• Explain high variability in network connectivity

• Ability to match large scale statistics (e.g.

power laws) is only secondary evidence

33 10

010

110

2

Degree10

-1

100

101

102

103

Ban

dwid

th (

Gbp

s)

15 x 10 GE

15 x 3 x 1 GE

15 x 4 x OC12

15 x 8 FE

Technology constraint

Total Bandwidth

Bandwidth per Degree

Router Technology Constraint

34

Cisco 12416 GSR, circa 2002 high BW low degree

high degree low BW

approximate

aggregate

feasible region

Aggregate Router Feasibility

core technologies

edge technologies

older/cheaper

technologies

Source: Cisco Product Catalog, June 2002 35 Rank (number of users)

Co

nn

ecti

on

Sp

eed

(M

bp

s)

1e-1

1e-2

1

1e1

1e2

1e3

1e4

1e2 1 1e4 1e6 1e8

Dial-up

~56Kbps

Broadband

Cable/DSL

~500Kbps

Ethernet

10-100Mbps

Ethernet

1-10Gbps

most users

have low speed

connections

a few users have very

high speed

connections

high

performance

computing academic

and corporate

residential and

small business

Variability in End-User Bandwidths

36

Page 10: 15-744: Computer Networking

10

Heuristically Optimal Topology

Mesh-like core of fast, low degree routers

High degree nodes

are at the edges.

37

Comparison Metric: Network Performance

Given realistic technology constraints on routers, how well

is the network able to carry traffic?

Step 1: Constrain to

be feasible

Abstracted

Technologically

Feasible Region

1

10

100

1000

10000

100000

1000000

10 100 1000

degree

Ban

dw

idth

(M

bp

s)

Step 3: Compute max flow

Bi

Bj

xij

Step 2: Compute traffic demand

38

Likelihood-Related Metric

• Easily computed for any graph

• Depends on the structure of the graph, not the generation mechanism

• Measures how “hub-like” the network core is

• For graphs resulting from probabilistic construction (e.g. PLRG/GRG),

LogLikelihood (LLH) L(g)

• Interpretation: How likely is a particular graph (having given node degree distribution) to be constructed?

Define the metric (di = degree of

node i)

39

Lmaxl(g) = 1P(g) = 1.08 x 1010

P(g) Perfomance (bps)

PA PLRG/GRG HOT Abilene-inspired Sub-optimal

0 0.2 0.4 0.6 0.8 1

10 10

10 11

10 12

l(g) = Relative Likelihood 40

Page 11: 15-744: Computer Networking

11

PA PLRG/GRG HOT

Structure Determines Performance

P(g) = 1.19 x 1010 P(g) = 1.64 x 1010 P(g) = 1.13 x 1012

41

Summary Network Topology

• Faloutsos3 [SIGCOMM99] on Internet topology • Observed many “power laws” in the Internet structure

• Router level connections, AS-level connections, neighborhood sizes

• Power law observation refuted later, Lakhina [INFOCOM00]

• Inspired many degree-based topology generators • Compared properties of generated graphs with those of measured graphs

to validate generator

• What is wrong with these topologies? Li et al [SIGCOMM04]

• Many graphs with similar distribution have different properties

• Random graph generation models don’t have network-intrinsic meaning

• Should look at fundamental trade-offs to understand topology • Technology constraints and economic trade-offs

• Graphs arising out of such generation better explain topology and its properties, but are unlikely to be generted by random processes!

42

Outline

• Motivation/Background

• Power Laws

• Optimization Models

• Graph Generation

43

Graph Generation

• Many important topology metrics

• Spectrum

• Distance distribution

• Degree distribution

• Clustering…

• No way to reproduce most of the important

metrics

• No guarantee there will not be any other/

new metric found important

44

Page 12: 15-744: Computer Networking

12

dK-series approach

• Look at inter-dependencies among topology

characteristics

• See if by reproducing most basic, simple,

but not necessarily practically relevant

characteristics, we can also reproduce

(capture) all other characteristics, including

practically important

• Try to find the one(s) defining all others

0K

Average degree <k>

1K

Degree distribution P(k)

2K

Joint degree distribution P(k1,k2)

Page 13: 15-744: Computer Networking

13

3K

“Joint edge degree” distribution P(k1,k2,k3)

3K, more exactly

4K Definition of dK-distributions

dK-distributions are degree correlations

within simple connected graphs of size d

Page 14: 15-744: Computer Networking

14

Nice properties of properties Pd

• Constructability: we can construct graphs

having properties Pd (dK-graphs)

• Inclusion: if a graph has property Pd, then

it also has all properties Pi, with i < d (dK-

graphs are also iK-graphs)

• Convergence: the set of graphs having

property Pn consists only of one element, G

itself (dK-graphs converge to G)

Rewiring

54