SlideShare une entreprise Scribd logo
1  sur  45
InetDim: Characterizing the  Internet Delay Space Dimensionality Bruno Abrahao  Robert Kleinberg Cornell University
[object Object],[object Object],InetDim Project
[object Object],[object Object],Current Investigation
[object Object],[object Object],[object Object],[object Object],[object Object],Definitions
[object Object],Question
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coordinate-based positioning systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Measurement based positioning systems
[object Object],[object Object],[object Object],[object Object],[object Object],Motivation 1: Coordinate-based positioning systems
[object Object],[object Object],[object Object],[object Object],Motivation 1: Coordinate-based positioning systems
[object Object],[object Object],Motivation 2: Measurement-based positining systems
[object Object],[object Object],[object Object],Motivation 3: Internet properties
[object Object],[object Object],[object Object],[object Object],Motivation 4: Synthetic delay space generation
[object Object],[object Object],Outline
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Datasets 1/2
[object Object],[object Object],[object Object],[object Object],Datasets 2/2
Meridian geolocation visualization
[object Object],[object Object],[object Object],[object Object],[object Object],Part I: Dimensionality measures
Embedding Dimension ,[object Object],[object Object],[object Object],Meridian
Embedding Dimension Shortcomings (1/2) ,[object Object],[object Object],Meridian
[object Object],[object Object],[object Object],[object Object],Embedding Dimension Shortcomings (2/2)
[object Object],[object Object],Principal Component Analysis Meridian
[object Object],[object Object],[object Object],Principal Component Analysis ? ? ? Meridian
[object Object],[object Object],Intrinsic notion of dimensionality
[object Object],Intrinsic dimensionality metrics ,[object Object],[object Object],Meridian P2PSim Includes almost all intra-continental distances (usec)
Correlation Dimension ,[object Object],x r
Correlation Dimension ,[object Object],x r
Sampling from a unit square
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fractal Dimension Family Easy to measure Sensitive to  non-linear behavior
[object Object],Correlation Dimension of Embedded Matrix
[object Object],[object Object],[object Object],[object Object],[object Object],Fractals and Internet Models
[object Object],[object Object],[object Object],Part II: Dimensionality Components
[object Object],[object Object],Geographic Location
[object Object],[object Object],Dimensionality Reducing Decomposition ,[object Object],[object Object]
[object Object],Dimensionality Reducing Decomposition
[object Object],[object Object],[object Object],[object Object],[object Object],Dimensionality Reducing Decomposition
Dimensionality Reducing Decomposition Results ,[object Object]
Dimensionality Reducing Decomposition Results ,[object Object],[object Object]
[object Object],[object Object],[object Object],Sanity Check 1
[object Object],Distance-based Clustering ,[object Object]
[object Object],[object Object],[object Object],Sanity Check 2
Random subsets with lower cardinality ,[object Object]
[object Object],[object Object],Dimensionality Paradox
[object Object],Isomap Space is rich in non-linearity
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conclusion
[object Object],[object Object],[object Object],Further Info

Contenu connexe

Tendances

Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...dbpublications
 
Efficient Neural Network Architecture for Image Classfication
Efficient Neural Network Architecture for Image ClassficationEfficient Neural Network Architecture for Image Classfication
Efficient Neural Network Architecture for Image ClassficationYogendra Tamang
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
 
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.GeeksLab Odessa
 
A new approach for area coverage problem in wireless sensor networks with hyb...
A new approach for area coverage problem in wireless sensor networks with hyb...A new approach for area coverage problem in wireless sensor networks with hyb...
A new approach for area coverage problem in wireless sensor networks with hyb...ijmnct
 
A review on routing protocols and non uniformity
A review on routing protocols and non uniformityA review on routing protocols and non uniformity
A review on routing protocols and non uniformityiaemedu
 
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...IDES Editor
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Understanding Convolutional Neural Networks
Understanding Convolutional Neural NetworksUnderstanding Convolutional Neural Networks
Understanding Convolutional Neural NetworksJeremy Nixon
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksPvrtechnologies Nellore
 

Tendances (20)

CNN
CNNCNN
CNN
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
Recognition and Detection of Real-Time Objects Using Unified Network of Faste...
 
Efficient Neural Network Architecture for Image Classfication
Efficient Neural Network Architecture for Image ClassficationEfficient Neural Network Architecture for Image Classfication
Efficient Neural Network Architecture for Image Classfication
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...
 
AlexNet
AlexNetAlexNet
AlexNet
 
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.
AI&BigData Lab 2016. Александр Баев: Transfer learning - зачем, как и где.
 
A new approach for area coverage problem in wireless sensor networks with hyb...
A new approach for area coverage problem in wireless sensor networks with hyb...A new approach for area coverage problem in wireless sensor networks with hyb...
A new approach for area coverage problem in wireless sensor networks with hyb...
 
A review on routing protocols and non uniformity
A review on routing protocols and non uniformityA review on routing protocols and non uniformity
A review on routing protocols and non uniformity
 
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
50120130406028 2
50120130406028 250120130406028 2
50120130406028 2
 
cec2013
cec2013cec2013
cec2013
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Understanding Convolutional Neural Networks
Understanding Convolutional Neural NetworksUnderstanding Convolutional Neural Networks
Understanding Convolutional Neural Networks
 
1104.0355
1104.03551104.0355
1104.0355
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networks
 

Similaire à On the Internet Delay Space Dimensionality

IRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET Journal
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...ijcsit
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMcscpconf
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksIRJET Journal
 
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...AtakanAral
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
Empirical Network Classification
Empirical Network ClassificationEmpirical Network Classification
Empirical Network ClassificationColleen Farrelly
 
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...JIEMS Akkalkuwa
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIRJET Journal
 
LIDAR- Light Detection and Ranging.
LIDAR- Light Detection and Ranging.LIDAR- Light Detection and Ranging.
LIDAR- Light Detection and Ranging.Gaurav Agarwal
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
IRJET- Weakly Supervised Object Detection by using Fast R-CNN
IRJET- Weakly Supervised Object Detection by using Fast R-CNNIRJET- Weakly Supervised Object Detection by using Fast R-CNN
IRJET- Weakly Supervised Object Detection by using Fast R-CNNIRJET Journal
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintNam Le
 

Similaire à On the Internet Delay Space Dimensionality (20)

IRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial ImagesIRJET - Gender Recognition from Facial Images
IRJET - Gender Recognition from Facial Images
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor Networks
 
C1804011117
C1804011117C1804011117
C1804011117
 
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
Resource Mapping Optimization for Distributed Cloud Services - PhD Thesis Def...
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Empirical Network Classification
Empirical Network ClassificationEmpirical Network Classification
Empirical Network Classification
 
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTE
 
LIDAR- Light Detection and Ranging.
LIDAR- Light Detection and Ranging.LIDAR- Light Detection and Ranging.
LIDAR- Light Detection and Ranging.
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
IRJET- Weakly Supervised Object Detection by using Fast R-CNN
IRJET- Weakly Supervised Object Detection by using Fast R-CNNIRJET- Weakly Supervised Object Detection by using Fast R-CNN
IRJET- Weakly Supervised Object Detection by using Fast R-CNN
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
 

Dernier

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Dernier (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

On the Internet Delay Space Dimensionality

Notes de l'éditeur

  1. In this work, we view the Internet as a metric space, where the metric is defined as the round-trip time to send a packet between two hosts.  One of the most important properties that characterizes a metric space is its dimensionality.  Properly estimating the dimensionality of a metric space is crucial for characterizing its structure and designing algorithms based on that space: if one's estimate of the dimension is too low, it is impossible to find an embedding that preserves distances; if the estimate is too high then we make the algorithms inefficient as we run into the so-called curse of dimensionality: there are too many degrees of freedom to explore and the algorithms get lost.  A major application of this abstraction is a coordinate-based positioning system. These systems aim at mapping the network into a metric space in such a way that the geometric distances estimates the real latency with low degree of error. For such systems, the dimensionality of the target space is a tunable parameter. In addition the dimensionality is known to affect the accuracy of the predictions, the stability of coordinates over time and the time to converge to stable coordinates. Our uses a latency matrix obtained via the King method, which is a convenient way Of measuring the latency between nameservers without having login access to them, to answer two fundamental questions: What is the dimensionality of the Internet delay space? And… What forces contribute to its geometric properties? Apart from its implications to the performance of coordinate systems, this characterization is by itself a topic of practical interest as it uncovers properties and opens new questions on the nature and complexity of the network.
  2. Measurement-based positioning systems implement the same functionality as the coordinate-based counterparts by performing measurements in a careful way.
  3. In this work, we view the Internet as a metric space, where the metric is defined as the round-trip time to send a packet between two hosts.  One of the most important properties that characterizes a metric space is its dimensionality.  Properly estimating the dimensionality of a metric space is crucial for characterizing its structure and designing algorithms based on that space: if one's estimate of the dimension is too low, it is impossible to find an embedding that preserves distances; if the estimate is too high then we make the algorithms inefficient as we run into the so-called curse of dimensionality: there are too many degrees of freedom to explore and the algorithms get lost.  A major application of this abstraction is a coordinate-based positioning system. These systems aim at mapping the network into a metric space in such a way that the geometric distances estimates the real latency with low degree of error. For such systems, the dimensionality of the target space is a tunable parameter. In addition the dimensionality is known to affect the accuracy of the predictions, the stability of coordinates over time and the time to converge to stable coordinates. Our uses a latency matrix obtained via the King method, which is a convenient way Of measuring the latency between nameservers without having login access to them, to answer two fundamental questions: What is the dimensionality of the Internet delay space? And… What forces contribute to its geometric properties? Apart from its implications to the performance of coordinate systems, this characterization is by itself a topic of practical interest as it uncovers properties and opens new questions on the nature and complexity of the network. Prior work: 5- to 9- dimensional Euclidean space with “reasonably” low distortion
  4. data can be approximately embedded into a low-dimensional Euclidean space the distance matrix can be accurately approximated by a low-rank matrix
  5. Dimensionality notions used in prior work often reflect the assumption that low-dimensional data can be approximately embedded in a low-dimensional Euclidean space or that the distance matrix can be accurately approximated by a low-rank matrix.  Thus, one could define the embedding dimension of a space by finding the lowest-dimensional Euclidean space that admits an embedding with adequate percentiles of relative error, or one could define the dimension by using Principal Component Analysis to identify the smallest value of k for which the distance matrix has a rank-k approximation with adequate relative error.  In these two plots we see the outcome of applying this process to the Internet measurements mentioned earlier.  The vertical bar in the graph on the left shows the relative error obtained when embedding the data into a Euclidean space of dimension 1,2,3, etc. The graph on the right shows the percent of variance explained by the first k principal components of the distance matrix for varying values of k. What are the problems with these methods? 1) The problem with the first approach is that the embedding algorithm might fail to produce the real value of dimensionality, since the curse of dimensionality comes into play: after 7 dimensions we observe higher percentiles of relative errors. 2) The problem with PCA is that, 2.1) as a method grounded in linear algebra, it is oblivious to non-linear relationships between the dimensions. For instance, if we try to estimate the surface of a sphere, it will indicate a 3 dimensional object whereas it is actually 2 dimensional. 2.2) As in the case of this plot it is not always clear where to establish the cutoff point beyond which the subsequent components explain only a negligible variance. To the extent that these methods estimate the dimensionality of the delay space, they indicate a value between 4 and 7.
  6. Dimensionality notions used in prior work often reflect the assumption that low-dimensional data can be approximately embedded in a low-dimensional Euclidean space or that the distance matrix can be accurately approximated by a low-rank matrix.  Thus, one could define the embedding dimension of a space by finding the lowest-dimensional Euclidean space that admits an embedding with adequate percentiles of relative error, or one could define the dimension by using Principal Component Analysis to identify the smallest value of k for which the distance matrix has a rank-k approximation with adequate relative error.  In these two plots we see the outcome of applying this process to the Internet measurements mentioned earlier.  The vertical bar in the graph on the left shows the relative error obtained when embedding the data into a Euclidean space of dimension 1,2,3, etc. The graph on the right shows the percent of variance explained by the first k principal components of the distance matrix for varying values of k. What are the problems with these methods? 1) The problem with the first approach is that the embedding algorithm might fail to produce the real value of dimensionality, since the curse of dimensionality comes into play: after 7 dimensions we observe higher percentiles of relative errors. 2) The problem with PCA is that, 2.1) as a method grounded in linear algebra, it is oblivious to non-linear relationships between the dimensions. For instance, if we try to estimate the surface of a sphere, it will indicate a 3 dimensional object whereas it is actually 2 dimensional. 2.2) As in the case of this plot it is not always clear where to establish the cutoff point beyond which the subsequent components explain only a negligible variance. To the extent that these methods estimate the dimensionality of the delay space, they indicate a value between 4 and 7.
  7. If the measured distances reflect a metric other than Euclidean distance Algorithm fails to produce low-distortion embedding in any dimension! e.g., hilly terrain
  8. In our work, we explore the structural and statistical properties of the Internet delay space in order to better characterize its dimensionality. For instance, metric spaces that exhibit power-law behavior can be measured using fractal dimensions Which is a intrinsic measure that work without a reference to a external metric space. One of the way from which the power law behavior arises in the delay space is When we plot in logscale the number of nodes (y-axis) that are within a given distance (x-axis). 1) The first striking feature of this plot is a power law that persists over two orders of magnitude. Datasets that display a property like that are said to behavior like a fractal. 2) Another interesting observation is that this range of distances include all RTT between 2 and 100ms, Which in turn include all non-oceanic distances. 3) When we observe this behavior, we can measure the intrisic dimensionality of the dataset as the power-law exponent. The other surprising finding is that the intrinsic dimensionality measured by this method is so much lower than what can be estimated by previous methods!
  9. Is the dimensionality value less than 2D due to the fact that the Internet lives on the surface of the Earth? Is the surface of the Earth 0.9-dimensional?
  10. Another way in which our work illuminates the structure of the delay space is by revealing that the delay space is not homogeneously 1.8-dimensional but is made up of a small number of low-dimensional pieces. One might expect the subnetworks to be simper because the decomposition eliminated inefficient routes that go from a network, up to its Tier-1 provider, over to another Tier-1 provider down to its customer. Or perhaps this decomposition just decomposed the network into subsnetworks of equal complexity. I ’ll now show that that’s not the case. Upon decomposing the delay space into overlapping pieces, each corresponding to A Tier-1 AS and its downstream customers, we observe that each individual piece Has dimensionality 10% lower than the combined delay space. This dimensionality shift cannot be achieved by other kinds of decompositions, namely By decomposing into pieces of low diameter, or clustered geographically, or randomly selecting a set with lower cardinality. Another interesting finding is that this dimensionality shift can only be detected by fractal measures. The embedding dimension and PCA are oblivious to it. This also demonstrates the power and applicability of the fractal measures. Disproportionate to the rest of the links What is the geometric effect of analyzing each Tier-1 network, together with its downstream customers in isolation Expect better behaved pieces
  11. So far, this presentation presented no evidence that the this study may lead to better network embeddings. In fact, the evidence so far suggests the opposite. However, now we ’ll see that it does lead to better non-linear embeddings.