SlideShare a Scribd company logo
1 of 20
Download to read offline
Network	
  Topology	
  
“more	
  than	
  just	
  a	
  pre/y	
  face”	
  
Science	
  of	
  Visualiza8on	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
Avoiding	
  Cascading	
  Failures	
  
Border	
  Gateway	
  Patrol	
  	
  	
  	
  	
  	
  	
  
Conceptual	
  Controversy	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Nega8ve	
  Externali8es	
  	
  	
  	
  	
  	
  	
  
Parasi8c	
  Compu8ng	
  	
  
Barabási’s	
  Model	
  
Who’s	
  In	
  Control?	
  	
  
Digital	
  Switches:	
  Net	
  Terrorism	
  
Subgroups	
  and	
  Neighborhoods	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Unintended	
  Consequences	
  	
  
	
  	
  	
  	
  	
  	
  	
  
Self-­‐organizing	
  Networks	
  	
  
Epidemics	
  Reconsidered	
  
Evolu8on	
  of	
  BGP:	
  Op8miza8on	
  
Emergence	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
A	
  Ques8on	
  of	
  Agency	
  
Scien8fic	
  Visualiza8on	
  &	
  Sta8s8cs	
  

Lorraine	
  Daston	
  &	
  Peter	
  Galison	
  

Burch/Cheswick	
  Map	
  of	
  the	
  Web	
  
Network	
  Protocol	
  Design	
  

	
  

	
  SSFNet,	
  a	
  visualiza8on	
  tool	
  for	
  internet	
  protocols	
  
Border	
  Gateway	
  Patrol	
  (BGP)	
  
AS	
  
AS	
  

Physical	
  Network	
  Topology	
  

BGP	
  Rou8ng	
  Topology	
  
Conceptual	
  Controversy	
  
–  op8miza8on	
  vs.	
  random	
  preferen8al	
  aachment	
  

From	
  “Luck	
  or	
  Reason”	
  –	
  Nature	
  2012;	
  Barabási	
  
Barabási’s	
  Model	
  
	
  1/N	
  effect:	
  constant	
  system	
  size	
  increasing	
  
Ƒd

∝da , a < 0

Faloutsos, et. al
Who’s	
  in	
  control?	
  

Small-­‐World	
  Systems	
  

Ultra-­‐Large	
  Systems	
  
Subgroups	
  and	
  Neighborhoods	
  

from	
  Cornell	
  University’s	
  “Computa8onal	
  Methods	
  for	
  Nonlinear	
  Systems”	
  course	
  
Complexity	
  of	
  
managing	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  3G/
4G	
  networks	
  
	
  
Mul8-­‐layer,	
  mul8-­‐
technology	
  networks	
  
	
  
Quality	
  of	
  service	
  
requirements	
  

Opera6onal	
  Drivers	
  

Increased	
  demand	
  	
  	
  
for	
  data	
  services	
  
	
  
Increased	
  diversity	
  	
  	
  
of	
  services	
  
	
  
Reduced	
  revenue	
  	
  	
  
per	
  delivery	
  bit	
  
	
  
Pressure	
  to	
  	
  	
  	
  	
  	
  
become	
  compe88ve	
  
	
  

Technology	
  Drivers	
  

Market	
  Drivers	
  

Why	
  do	
  we	
  need	
  self-­‐organizing	
  networks?	
  
Labor-­‐intensive	
  
opera8ons	
  
	
  
Processes	
  need	
  
manual	
  interven8on	
  
to	
  obtain	
  opera8onal	
  
or	
  deployment	
  
savings	
  
	
  
Processes	
  that	
  are	
  too	
  
fast,	
  too	
  granular,	
  or	
  
too	
  complex	
  for	
  
manual	
  interven8on	
  

Paraphrased	
  from	
  Celcite’s	
  Cops-­‐	
  SON	
  product	
  page	
  at	
  
hp://www.celcite.com/cops/products/cops-­‐son/index.html	
  	
  	
  
Evolu8on	
  of	
  BGP:	
  Op8miza8on	
  

CAIDA	
  1999	
  
BGP	
  Rou8ng	
  Table,	
  exhibi8ng	
  
preferen8al	
  hub	
  behavior	
  

BBC’s	
  adver8sed	
  BGP	
  rou8ng	
  
table	
  before	
  the	
  2012	
  
Olympics,	
  exhibi8ng	
  
preferen8al	
  peering	
  behavior	
  	
  	
  	
  
Avoiding	
  Cascading	
  Failures	
  

Alex	
  Abella’s	
  2009	
  
Book	
  Cover	
  

Link	
  to	
  Paul	
  Baran’s	
  2001	
  
interview	
  with	
  Wired	
  
Nega8ve	
  Externali8es	
  

…maar	
  ‘n	
  grapje	
  

Link	
  to	
  Jakob	
  Nielsen’s	
  	
  1998	
  take	
  on	
  	
  
“Figh8ng	
  Linkrot”	
  
Parasi8c	
  Compu8ng	
  

Link	
  to	
  Inquirer	
  ar8cle	
  on	
  	
  
Anonymous-­‐credited	
  HSBC	
  aack	
  

Link	
  to	
  Forbes	
  ar8cles	
  on	
  	
  
LulzSec	
  aack	
  on	
  CIA.gov	
  

Metaphoric	
  DDoS	
  aack	
  
Digital	
  Switches:	
  Net	
  Terrorism	
  
	
  
Unintended	
  Consequences	
  

Heavy-­‐tailed	
  TCP	
  session	
  model	
  from	
  SSFNet	
  
Epidemics	
  Reconsidered	
  

Link	
  to	
  INSEAD’s	
  interpreta8on	
  of	
  Taleb’s	
  Four	
  Quadrants,	
  The	
  Black	
  Swan	
  
Emergence	
  
A	
  Ques8on	
  of	
  Agency	
  

Link	
  to	
  the	
  en8re	
  book	
  	
  
Wrap	
  Up	
  

Link	
  to	
  Cody	
  Dunne’s	
  paper	
  on	
  improving	
  network	
  visualiza8on	
  readability	
  
Extra	
  Works	
  Consulted	
  
Afanasyev,	
  Alexander	
  et.	
  al.	
  “BGP	
  Rou8ng	
  Table:	
  Trends	
  and	
  Challenges”.	
  Laboratory	
  for	
  Advanced	
  Systems	
  
Reseach.	
  (2010)	
  UCLA.	
  	
  
Balke,	
  Wolf-­‐Tilo	
  and	
  Wolf	
  Siberski.	
  “Random	
  Graphs,	
  Small-­‐Worlds,	
  and	
  Scale-­‐Free	
  Networks”	
  L3S	
  Research	
  
Center.	
  (2007)	
  University	
  of	
  Hanover.	
  	
  
Barabasi,	
  Albert-­‐Laszlo.	
  “Luck	
  or	
  Reason”.	
  Nature.	
  (2012)	
  BarabasiLab.com.	
  MacMillan	
  Publishers.	
  	
  
Bu,	
  Tian	
  and	
  Don	
  Townsley.	
  “On	
  Dis8nguishing	
  between	
  Internet	
  Power	
  Law	
  Topology	
  Generators”.	
  
Proceedings	
  IEEE	
  INFOCOM	
  2002,	
  The	
  21st	
  Annual	
  Joint	
  Conference	
  of	
  the	
  IEEE	
  Computer	
  and	
  
Communica8ons	
  Socie8es.	
  (2002)	
  New	
  York,	
  USA.	
  	
  
Claffy,	
  KC.	
  “Internet	
  measurement	
  and	
  data	
  analysis:	
  topology,	
  workload,	
  performance	
  and	
  rou8ng	
  sta8s8cs”.	
  
(1999)	
  Coopera8ve	
  Associate	
  for	
  Internet	
  Data	
  Analysis	
  [CAIDA.org]	
  
D’Souza,	
  Raissa	
  M.	
  et.	
  al.	
  “Emergence	
  of	
  tempered	
  preferen8al	
  aachment	
  from	
  op8miza8on.	
  PNAS	
  104,	
  no.	
  
15.	
  (2007):	
  6112-­‐6117.	
  	
  
Dunne,	
  Cody	
  and	
  Ben	
  Shneiderman.	
  “Mo8f	
  Simplifica8on:	
  Improving	
  Network	
  Visualiza8on	
  Readability	
  with	
  
Fan	
  and	
  Parallel	
  Glyphs”.	
  HCIL	
  Tech	
  Report	
  (2012):	
  1-­‐11.	
  University	
  of	
  Maryland.	
  	
  
Jovanović,	
  Mihajlo.	
  “Modeling	
  Peer-­‐to-­‐Peer	
  Network	
  Topologies	
  Through	
  “Small-­‐World”	
  Models	
  and	
  Power	
  
Laws”.	
  IX	
  CommunicaMons	
  Forum	
  Telfor.	
  (2001)	
  Belgrade,	
  Serbia.	
  
Fabrikant,	
  Alex;	
  Elias	
  Koutsoupias;	
  and	
  Christos	
  H.	
  Papadimitrious.	
  “Heuris8cally	
  Op8mized	
  Trade-­‐offs:	
  A	
  New	
  
Paradigm	
  for	
  Power	
  Laws	
  in	
  the	
  Internet”.	
  (2002)	
  Stanford.edu.	
  	
  
Loridas,	
  Panagio8s;	
  Diomidis	
  Spinellis,	
  and	
  Vasileios	
  Vlachos.	
  “Power	
  Laws	
  in	
  Sovware”.	
  ACM	
  TransacMons	
  on	
  
SoNware	
  Engineering	
  and	
  Methodology	
  18,	
  no.1	
  (2008):1–26.	
  Athens	
  University	
  of	
  Economics	
  and	
  
Business.	
  	
  
Mitzenmacher,	
  Michael.	
  “A	
  Brief	
  History	
  of	
  Genera8ve	
  Models	
  for	
  Power	
  Law	
  and	
  Lognormal	
  Distribu8ons”.	
  
Internet	
  MathemaMcs	
  1,	
  no.	
  2	
  (2004):	
  226-­‐251	
  
Shakkoai,	
  Srinivas	
  and	
  R.	
  Srikant.	
  “Network	
  Op8miza8on	
  and	
  Control”.	
  FoundaMons	
  and	
  Trends	
  in	
  Networking	
  
2,	
  no.	
  3.	
  (2007):	
  271-­‐379.	
  	
  
Stumpf,	
  Michael	
  P.	
  H.	
  and	
  Mason	
  A.	
  Porter.	
  “Cri8cal	
  Truths	
  About	
  Power	
  Laws”.	
  Science	
  335	
  (2012):	
  665-­‐666.	
  	
  
“Ultra-­‐Large	
  Scale	
  Systems”.	
  Sovware	
  	
  Engineering	
  Ins8tute.	
  (2009)	
  CarnegieMellon.	
  	
  

More Related Content

Viewers also liked

ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
Daniel Katz
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
Daniel Katz
 
Identification of novel potential anti cancer agents using network pharmacolo...
Identification of novel potential anti cancer agents using network pharmacolo...Identification of novel potential anti cancer agents using network pharmacolo...
Identification of novel potential anti cancer agents using network pharmacolo...
Cresset
 

Viewers also liked (7)

Are Powerlaws Useful?
Are Powerlaws Useful?Are Powerlaws Useful?
Are Powerlaws Useful?
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
 
Science Of Networks
Science Of NetworksScience Of Networks
Science Of Networks
 
Identification of novel potential anti cancer agents using network pharmacolo...
Identification of novel potential anti cancer agents using network pharmacolo...Identification of novel potential anti cancer agents using network pharmacolo...
Identification of novel potential anti cancer agents using network pharmacolo...
 
Precision Medicine in Neuroendocrine Tumors: Targeted Drugs, Where Are We Hea...
Precision Medicine in Neuroendocrine Tumors: Targeted Drugs, Where Are We Hea...Precision Medicine in Neuroendocrine Tumors: Targeted Drugs, Where Are We Hea...
Precision Medicine in Neuroendocrine Tumors: Targeted Drugs, Where Are We Hea...
 
Networkx & Gephi Tutorial #Pydata NYC
Networkx & Gephi Tutorial #Pydata NYCNetworkx & Gephi Tutorial #Pydata NYC
Networkx & Gephi Tutorial #Pydata NYC
 

Similar to Network Topologies - Barabasi & Power Laws

Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And Grid
Ian Foster
 
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
BigMine
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
IJECEIAES
 
COMMUNICATIONS OF THE ACM November 2004Vol. 47, No. 11 15.docx
COMMUNICATIONS OF THE ACM November  2004Vol. 47, No. 11 15.docxCOMMUNICATIONS OF THE ACM November  2004Vol. 47, No. 11 15.docx
COMMUNICATIONS OF THE ACM November 2004Vol. 47, No. 11 15.docx
monicafrancis71118
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
Jessica Deakin
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Nam Le
 
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
Artificial Intelligence Institute at UofSC
 

Similar to Network Topologies - Barabasi & Power Laws (20)

Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And Grid
 
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
Challenging Problems for Scalable Mining of Heterogeneous Social and Informat...
 
DEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 carsDEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 cars
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
Opportunities for X-Ray science in future computing architectures
Opportunities for X-Ray science in future computing architecturesOpportunities for X-Ray science in future computing architectures
Opportunities for X-Ray science in future computing architectures
 
Lambda data grid: communications architecture in support of grid computing
Lambda data grid: communications architecture in support of grid computingLambda data grid: communications architecture in support of grid computing
Lambda data grid: communications architecture in support of grid computing
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
Study of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksStudy of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networks
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Cyberinfrastructure and Applications Overview: Howard University June22
Cyberinfrastructure and Applications Overview: Howard University June22Cyberinfrastructure and Applications Overview: Howard University June22
Cyberinfrastructure and Applications Overview: Howard University June22
 
COMMUNICATIONS OF THE ACM November 2004Vol. 47, No. 11 15.docx
COMMUNICATIONS OF THE ACM November  2004Vol. 47, No. 11 15.docxCOMMUNICATIONS OF THE ACM November  2004Vol. 47, No. 11 15.docx
COMMUNICATIONS OF THE ACM November 2004Vol. 47, No. 11 15.docx
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
 
Semantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream DataSemantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream Data
 
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
Data Processing and Semantics for Advanced Internet of Things (IoT) Applicati...
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Network Topologies - Barabasi & Power Laws

  • 1. Network  Topology   “more  than  just  a  pre/y  face”   Science  of  Visualiza8on                                                                   Avoiding  Cascading  Failures   Border  Gateway  Patrol               Conceptual  Controversy                                                      Nega8ve  Externali8es               Parasi8c  Compu8ng     Barabási’s  Model   Who’s  In  Control?     Digital  Switches:  Net  Terrorism   Subgroups  and  Neighborhoods                                Unintended  Consequences                   Self-­‐organizing  Networks     Epidemics  Reconsidered   Evolu8on  of  BGP:  Op8miza8on   Emergence                                                   A  Ques8on  of  Agency  
  • 2. Scien8fic  Visualiza8on  &  Sta8s8cs   Lorraine  Daston  &  Peter  Galison   Burch/Cheswick  Map  of  the  Web  
  • 3. Network  Protocol  Design      SSFNet,  a  visualiza8on  tool  for  internet  protocols  
  • 4. Border  Gateway  Patrol  (BGP)   AS   AS   Physical  Network  Topology   BGP  Rou8ng  Topology  
  • 5. Conceptual  Controversy   –  op8miza8on  vs.  random  preferen8al  aachment   From  “Luck  or  Reason”  –  Nature  2012;  Barabási  
  • 6. Barabási’s  Model    1/N  effect:  constant  system  size  increasing   Ƒd ∝da , a < 0 Faloutsos, et. al
  • 7. Who’s  in  control?   Small-­‐World  Systems   Ultra-­‐Large  Systems  
  • 8. Subgroups  and  Neighborhoods   from  Cornell  University’s  “Computa8onal  Methods  for  Nonlinear  Systems”  course  
  • 9. Complexity  of   managing                      3G/ 4G  networks     Mul8-­‐layer,  mul8-­‐ technology  networks     Quality  of  service   requirements   Opera6onal  Drivers   Increased  demand       for  data  services     Increased  diversity       of  services     Reduced  revenue       per  delivery  bit     Pressure  to             become  compe88ve     Technology  Drivers   Market  Drivers   Why  do  we  need  self-­‐organizing  networks?   Labor-­‐intensive   opera8ons     Processes  need   manual  interven8on   to  obtain  opera8onal   or  deployment   savings     Processes  that  are  too   fast,  too  granular,  or   too  complex  for   manual  interven8on   Paraphrased  from  Celcite’s  Cops-­‐  SON  product  page  at   hp://www.celcite.com/cops/products/cops-­‐son/index.html      
  • 10. Evolu8on  of  BGP:  Op8miza8on   CAIDA  1999   BGP  Rou8ng  Table,  exhibi8ng   preferen8al  hub  behavior   BBC’s  adver8sed  BGP  rou8ng   table  before  the  2012   Olympics,  exhibi8ng   preferen8al  peering  behavior        
  • 11. Avoiding  Cascading  Failures   Alex  Abella’s  2009   Book  Cover   Link  to  Paul  Baran’s  2001   interview  with  Wired  
  • 12. Nega8ve  Externali8es   …maar  ‘n  grapje   Link  to  Jakob  Nielsen’s    1998  take  on     “Figh8ng  Linkrot”  
  • 13. Parasi8c  Compu8ng   Link  to  Inquirer  ar8cle  on     Anonymous-­‐credited  HSBC  aack   Link  to  Forbes  ar8cles  on     LulzSec  aack  on  CIA.gov   Metaphoric  DDoS  aack  
  • 14. Digital  Switches:  Net  Terrorism    
  • 15. Unintended  Consequences   Heavy-­‐tailed  TCP  session  model  from  SSFNet  
  • 16. Epidemics  Reconsidered   Link  to  INSEAD’s  interpreta8on  of  Taleb’s  Four  Quadrants,  The  Black  Swan  
  • 18. A  Ques8on  of  Agency   Link  to  the  en8re  book    
  • 19. Wrap  Up   Link  to  Cody  Dunne’s  paper  on  improving  network  visualiza8on  readability  
  • 20. Extra  Works  Consulted   Afanasyev,  Alexander  et.  al.  “BGP  Rou8ng  Table:  Trends  and  Challenges”.  Laboratory  for  Advanced  Systems   Reseach.  (2010)  UCLA.     Balke,  Wolf-­‐Tilo  and  Wolf  Siberski.  “Random  Graphs,  Small-­‐Worlds,  and  Scale-­‐Free  Networks”  L3S  Research   Center.  (2007)  University  of  Hanover.     Barabasi,  Albert-­‐Laszlo.  “Luck  or  Reason”.  Nature.  (2012)  BarabasiLab.com.  MacMillan  Publishers.     Bu,  Tian  and  Don  Townsley.  “On  Dis8nguishing  between  Internet  Power  Law  Topology  Generators”.   Proceedings  IEEE  INFOCOM  2002,  The  21st  Annual  Joint  Conference  of  the  IEEE  Computer  and   Communica8ons  Socie8es.  (2002)  New  York,  USA.     Claffy,  KC.  “Internet  measurement  and  data  analysis:  topology,  workload,  performance  and  rou8ng  sta8s8cs”.   (1999)  Coopera8ve  Associate  for  Internet  Data  Analysis  [CAIDA.org]   D’Souza,  Raissa  M.  et.  al.  “Emergence  of  tempered  preferen8al  aachment  from  op8miza8on.  PNAS  104,  no.   15.  (2007):  6112-­‐6117.     Dunne,  Cody  and  Ben  Shneiderman.  “Mo8f  Simplifica8on:  Improving  Network  Visualiza8on  Readability  with   Fan  and  Parallel  Glyphs”.  HCIL  Tech  Report  (2012):  1-­‐11.  University  of  Maryland.     Jovanović,  Mihajlo.  “Modeling  Peer-­‐to-­‐Peer  Network  Topologies  Through  “Small-­‐World”  Models  and  Power   Laws”.  IX  CommunicaMons  Forum  Telfor.  (2001)  Belgrade,  Serbia.   Fabrikant,  Alex;  Elias  Koutsoupias;  and  Christos  H.  Papadimitrious.  “Heuris8cally  Op8mized  Trade-­‐offs:  A  New   Paradigm  for  Power  Laws  in  the  Internet”.  (2002)  Stanford.edu.     Loridas,  Panagio8s;  Diomidis  Spinellis,  and  Vasileios  Vlachos.  “Power  Laws  in  Sovware”.  ACM  TransacMons  on   SoNware  Engineering  and  Methodology  18,  no.1  (2008):1–26.  Athens  University  of  Economics  and   Business.     Mitzenmacher,  Michael.  “A  Brief  History  of  Genera8ve  Models  for  Power  Law  and  Lognormal  Distribu8ons”.   Internet  MathemaMcs  1,  no.  2  (2004):  226-­‐251   Shakkoai,  Srinivas  and  R.  Srikant.  “Network  Op8miza8on  and  Control”.  FoundaMons  and  Trends  in  Networking   2,  no.  3.  (2007):  271-­‐379.     Stumpf,  Michael  P.  H.  and  Mason  A.  Porter.  “Cri8cal  Truths  About  Power  Laws”.  Science  335  (2012):  665-­‐666.     “Ultra-­‐Large  Scale  Systems”.  Sovware    Engineering  Ins8tute.  (2009)  CarnegieMellon.