Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15

Similar documents
6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks

Peer-to-Peer Data Management

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Distributed Data Management

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

CSCI5070 Advanced Topics in Social Computing

Scalable P2P architectures

Resilient Networking. Thorsten Strufe. Module 2: Background (Graph Analysis and Crypto) Disclaimer. Dresden, SS 17

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

M.E.J. Newman: Models of the Small World

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

Overlay (and P2P) Networks

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Mathematics - Why is it a Small World? Oskar Sandberg

Examples of Complex Networks

CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS

CS-E5740. Complex Networks. Scale-free networks

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns

Properties of Biological Networks

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.

ECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds

Networks and stability

Introduction to Graph Theory

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows)

GIAN Course on Distributed Network Algorithms. Network Topologies and Local Routing

Extracting Information from Complex Networks


Basics of Network Analysis

Lesson 18. Laura Ricci 08/05/2017

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

Modelling data networks research summary and modelling tools

Signal Processing for Big Data

Networks and Discrete Mathematics

Case Studies in Complex Networks

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

GIAN Course on Distributed Network Algorithms. Network Topologies and Interconnects

CAIM: Cerca i Anàlisi d Informació Massiva

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno

Erdős-Rényi Model for network formation

Introduction to network metrics

Analyzing the Characteristics of Gnutella Overlays

Peer-to-Peer Networks 15 Self-Organization. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Telematics Chapter 9: Peer-to-Peer Networks

CSE 158 Lecture 11. Web Mining and Recommender Systems. Triadic closure; strong & weak ties

Graph Theory and Network Measurment

Complex networks: A mixture of power-law and Weibull distributions

Constructing a G(N, p) Network

Flat Routing on Curved Spaces

RANDOM-REAL NETWORKS

Local Search in Unstructured Networks

1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G))

Degree Distribution: The case of Citation Networks

Deterministic small-world communication networks

1 Random Graph Models for Networks

Clustering Using Graph Connectivity

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

Summary: What We Have Learned So Far

Critical Phenomena in Complex Networks

Let G = (V, E) be a graph. If u, v V, then u is adjacent to v if {u, v} E. We also use the notation u v to denote that u is adjacent to v.

Community Detection. Community

Small-world networks

Complex Networks. Structure and Dynamics

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

A Generating Function Approach to Analyze Random Graphs

Scalable overlay Networks

On Static and Dynamic Partitioning Behavior of Large-Scale Networks

Behavioral Data Mining. Lecture 9 Modeling People

An Evolving Network Model With Local-World Structure

UNIVERSITA DEGLI STUDI DI CATANIA FACOLTA DI INGEGNERIA

Constructing a G(N, p) Network

Topic II: Graph Mining

Intro to Random Graphs and Exponential Random Graph Models

1 More configuration model

The Role of Homophily and Popularity in Informed Decentralized Search

Introduction to Peer-to-Peer Systems

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior

Graph-theoretic Properties of Networks

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

CS224W: Analysis of Networks Jure Leskovec, Stanford University

The Structure of Information Networks. Jon Kleinberg. Cornell University

Understanding Disconnection and Stabilization of Chord

Chapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han

The missing links in the BGP-based AS connectivity maps

Introduction III. Graphs. Motivations I. Introduction IV

Machine Learning and Modeling for Social Networks

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

Ian Clarke Oskar Sandberg

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Transcription:

Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15

Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators On robustness and resilience 15.06.2015 Privacy and Security Folie Nr. 2

Some questions... How robust is the Internet? Why do darknets work? What do the existing networks look like? What would an ideal computer network look like? Gnutella snapshot, 2000 Privacy and Security Folie Nr. 3

Scalability of Gnutella: quick answer How (well) does Gnutella work? Bandwidth generated in Bytes (Message 83 bytes) Searching for a 18 byte string T=2 T=3 T=4 T=5 T=6 T=7 T=8 N=2 332 498 664 830 996 1,162 1,328 N=3 747 1,743 3,735 7,719 15,687 31,623 63,495 N=4 1,328 4,316 13,280 40,172 120,848 362,876 1,088,960 N=5 2,075 8,715 35,275 141,515 566,475 2,266,315 9,065,675 N=6 2,988 15,438 77,688 388,938 1,945,188 9,726,438 48,632,688 N=7 4,067 24,983 150,479 903,455 5,421,311 35,528,447 192,171,26 3 N=8 5,312 37,848 262,600 1,859,864 13,019,712 91,138,648 637,971,20 0 N = number of connections, T = number of hops (TTL) * [SIC]: Error already in source, orders of magnitude are important, here ;) Source: Jordan Ritter: Why Gnutella Can't Scale. No, Really. Privacy and Security Folie Nr. 4

Graphs Rigorous analysis of networks: based on graph theory Refresher of graph theory needed Graph families and models Random graphs Small world graphs Scale-free graphs Graph theory and real computer networks How are the graph properties reflected in real systems? Users/nodes are represented by vertices in the graph Edges represent connections in overlay / routing table entries Concept of self-organization (how/why do they evolve?) Network structures emerge from simple rules E.g. also in social networks, www, actors playing together in movies Privacy and Security Folie Nr. 5

What Is a Graph? Definition of a graph: Graph G = (V, E) consists of two finite sets, set V of vertices (nodes) and set E of edges (arcs, links) for which the following apply: 1. If e E, then exists (v, u) V x V, such that v e and u e 2. If e E and above (v, u) exists, and further for (x, y) V x V applies x e and y e, then {v, u} = {x, y} e 1 1 2 e 2 e 5 e 4 Side note: Edges can have (multiple) weights 3 e 3 Example graph with 4 vertices and 5 edges w : E R 4 Privacy and Security Folie Nr. 6

How are Graphs Implemented? Adjacency/Incidence Matrix 1 2 3 1 0 1 0 2 1 0 1 3 0 1 0 Adjacency/Incidence List (Plus specialized others..) (1,2) (2,1),(2,3) (3,2) 1:2 2:1,3 3:2 VERY good book is: Sedgewick: Algorithms in C, part 3 (Graph Algorithms) Privacy and Security Folie Nr. 7

Properties of Graphs An edge e E is directed if the start and end vertices in condition 2 above are identical: v = x and y = u An edge e E is undirected if v = x and y = u as well as v = y and u = x are possible A graph G is directed (undirected) if the above property holds for all edges A loop is an edge with identical endpoints Graph G 1 = (V 1, E 1 ) is a subgraph of G = (V, E), if V 1 V and E 1 E (such that conditions 1 and 2 are met) Privacy and Security Folie Nr. 8

Important Types of Graphs Vertices v, u V are connected if there is a path from v to u: (v, v 2 ), (v 2, v 3 ),, (v k-1, u) E Graph G is connected if all v, u V are connected An undirected, connected, acyclic graph is called a tree Side note: Undirected, acyclic graphs which are not connected are called forest Directed, connected, acyclic graph is called DAG DAG = Directed Acyclic Graph (connectivity is assumed) An induced graph G(VC) = (VC, EC) is a graph VC V and with edges EC = {e = (i, j) i, j VC} (all edges from G connecting the nodes in GC) An induced graph that is connected is called a component Privacy and Security Folie Nr. 9

Some Examples of Computer Networks Early Computer Networks Aloha (or WSN, for that matters) Network Layers 1,2 Privacy and Security Folie Nr. 10

Examples: The Internet Globally internetworked computers (Layer 3) 3c 3a 3b AS3 1a 1c 1d 1b AS1 2a 2c AS2 2b Privacy and Security Folie Nr. 11

Examples: Overlays (Layer 7 (?)) A CLIQUE is a graph that is fully connected (u,v) E for all u V and v V, u v A (P2P) Overlay (V o,e o ) (in general) is a subgraph such that V o =V and E o E (edges are selected edges from a CLIQUE graph) Why? Considering the nodes to be on the Internet, they all can create connections between each other Privacy and Security Folie Nr. 12

Important Graph Metrics Order: the number of vertices in a graph: V Size of the graph is the number of edges E Distance: d(v, u) between vertices v and u is the length of the shortest path between v and u Diameter: d(g) of graph G is the maximum of d(v, u) for all v, u V The density of a graph is the ratio of the number of edges and the number of possible edges. Privacy and Security Folie Nr. 13

Graph Metrics: Vertex Degree In graph G = (V, E), the degree of vertex v V is the total number of edges (v, u) E and (u, v) E Degree is the number of edges which touch a vertex For directed graph, we distinguish between in-degree and outdegree In-degree is number of edges coming to a vertex Out-degree is number of edges going away from a vertex The degree of a vertex can be obtained as: Sum of the elements in its row in the incidence matrix Length of its vertex incidence list The degree distribution is the distribution over all node degrees (given as a frequency distribution or (often) complementary cumulative distribution function CCDF (Komplement der Verteilungsfunktion)) Privacy and Security Folie Nr. 14

Graph Metrics: Degree Distribution (Examples) Human Protein Interaction [biomedcentral.com] The Internet (AS-level) [pacm.princeton.edu] Online Social Network (xing crawl) [strufe10popularity] Privacy and Security Folie Nr. 15

Further Graph Metrics All pairs shortest paths (APSP): d(v, u) all v,u V Hop Plot: Distance distribution over all distances Hist(APSP(G)) Average/characteristic path length (CPL): Sum of the distances over all pairs of nodes divided by the number of pairs For defined routings (usually greedy) on graphs: Characterisic Routing Length (CRL): average length of paths found (potentially stochastic ) Privacy and Security Folie Nr. 16

Sanity Check: APSP: A: 1,1,1,2,2 B: 1,1,1,2,2 C: 1,1,1,1,1 B C D: 1,1,1,1,2 A F E: 1,1,1,2,2 F: 1,1,2,2,2 D E HopPlot: 1: 20 2: 10 B C CPL: CRL (CHORD): 40/30 = 1.333 2 A F D E Privacy and Security Folie Nr. 17

Important Graph Metrics (3) Edge connectivity: is the minimum number of edges that have to be removed to separate the graph into at least two components Vertex connectivity: the minimum number of nodes.. How can we calculate them? Which of both is higher? In which cases are they the same? So where do you attack? ;-) Refer to: maxflow, Menger s Theorem Privacy and Security Folie Nr. 18

Graph Metrics: Network Clustering Clustering coefficient: number of edges between neighbors divided by maximum number of edges between them k neighbors: k(k-1)/2 possible edges between them C( i) 2E( N( i)) d( i)( d( i) 1) E(N(i)) = number of edges between neighbors of i d(i) = degree of i What if: a node has only one neighbor? Variations exist: local, average, global CC Source: Wikipedia Privacy and Security Folie Nr. 19

Classes of Graphs Regular graphs Random graphs Graphs with Small-World characteristic Scale-free graphs Graphs with plenty more characteristics (dis-) assortativity Rich-club connectivity Privacy and Security Folie Nr. 20

Regular Graphs Regular graphs have traditionally been used to model networks, they Regular Graph have a constant node degree (discrete degree distribution of a single value) Different topologies possible However, the model does not reflect reality very well Privacy and Security Folie Nr. 21

Random Graphs Random graphs are first widely studied graph family Many overlay networks choose neighbors more or less randomly Two different generators generally used: Erdös and Renyi Gilbert Gilbert s definition: Graph G n,p (with n nodes) is a graph where the probability of an edge e = (v, w) is p Construction algorithm: For each possible edge, draw a random number in (0,1) If the number is smaller than p, then the edge exists ( p can be function of n or constant ) Privacy and Security Folie Nr. 22

Basic Results for Random Graphs Giant Connected Component Let c > 0 be a constant and p = c/n. If c < 1 every component of G n,p has order O(log N) with high probability. If c > 1 then there is one component of size n*(f(c) + O(1)) where f(c) > 0, with high probability. All other components have size O(log N) English: Giant connected component emerges with high probability when average degree is about 1 Node degree distribution If we take a random node, how high is the probability P(k) that it has degree k? Node degree is Poisson distributed Parameter c = expected number of occurrences P( k, c) c e k! k c Clustering coefficient Clustering coefficient of a random graph is asymptotically equal to p with high probability Privacy and Security Folie Nr. 23

Recall: Poisson! ;-) P( k, c) e k! k c c Privacy and Security Folie Nr. 24

Six Degrees of Separation Famous experiment from 1960 s (S. Milgram) Send a letter to random people in Kansas and Nebraska and ask people to forward letter to a person in Boston Person identified by name, profession, and city Rule: Give letter only to people you know by first name and ask them to pass it on according to same rule Note: Some letters reached their goal Letter needed six steps on average to reach the destination Graph theoretically: Social networks have dense local structure, but (apparently) small diameter Generally referred to as small world effect Usually, small number of persons act as hubs Privacy and Security Folie Nr. 26

Milgram's Small World Experiment Privacy and Security Folie Nr. 27

Graphs Simple metrics on Graphs Graph models - Random Graphs - Regular Graphs - Small World! - Scale Free -> more interesting metrics ;-) 15.06.2015 Privacy and Security Folie Nr. 28

Small-World Network Model Developed/discovered by Watts and Strogatz (1998) Over 30 years after Milgram s experiment! Watts and Strogatz looked at three networks Film collaboration between actors, US power grid, Neural network of worm Caenorhabditis elegans ( C. elegans ) Measured characteristics: Clustering coefficient as a measure for regularity, or locality of the network If it is high, short edges are more likely to exist than long edges The average path length between vertices Results: Grid-like networks: High clustering coefficient high average path length (edges are not random, but rather local ) Most real-world (natural) networks have a high clustering coefficient (0.3-0.4), but nevertheless a low average path length Privacy and Security Folie Nr. 29

Small-World Graph Generator (Watts & Strogatz) Put all n nodes on a ring, number them consecutively from 1 to n Connect each node with its k clockwise neighbors Traverse ring in clockwise order For every edge Draw random number r If r < p, then re-wire edge by selecting a random target node from the set of all nodes (no duplicates) Otherwise keep old edge Different values of p give different graphs If p is close to 0, then original structure mostly preserved If p is close to 1, then new graph is random Interesting things happen when p is somewhere in-between Privacy and Security Folie Nr. 31

Regular, Small-World, Random Regular Small-World Random p = 0 p = 1 Privacy and Security Folie Nr. 32

Kleinberg s Small-World Navigability Model Small-world model and power law explain why short paths exist Missing piece in the puzzle: why can we find these paths? Each node has only local information Even if a short cut exists, how do people know about it? Milgram s experiment: Some additional information (profession, address, hobbies etc.) is used to decide which neighbor is closest to recipient Results showed that first steps were the largest Kleinberg s Small-World Model Set of points in an n x n grid Distance is the number of steps separating points d(i, j) = x i - x j + y i - y j Privacy and Security Folie Nr. 33

Kleinberg s Topologies Take d-dimensional grid in which all nodes are connected to all neighbors along each axis Additionally connect nodes in higher distance with probability decreasing with distance iow: the probability that node j is selected as neighbor for I is proportional to d(i, j) -r, with clustering exponent r Privacy and Security Folie Nr. 34

Intuition of Navigation in Kleinberg s Model Simple greedy routing: nodes only know local links and target position, always use the link that brings message closest to target If r=2, expected lookup time is O(log 2 n) If r 2, expected lookup time is O(n ε ), where ε depends on r Kleinberg has shown: Number of messages needed is proportional to O(log² n) iff r=s (s = number of dimensions) Idea behind proof: for any r > s there are too few long edges to make paths short For r < s there are too many random edges too many choices for passing message, greedy may not deterministically converge to destination The message will make a (long) random walk through the network Privacy and Security Folie Nr. 36

Real-World Measurements: The Internet Faloutsos et al. study from 99: Internet topology examined in 1998 AS-level topology, during 1998 Internet grew by 45% Motivation: What does the Internet look like? Are there any topological properties that don t change over time? How to generate Internet-like graphs for simulations? 4 key properties found, each follows a power-law; Sort nodes according to their (out)degree 1. Out degree of a node is proportional to its rank to the power of a constant 2. Number of nodes with same out degree is proportional to the out degree to the power of a constant 3. Eigenvalues of a graph are proportional to the order to the power of a constant 4. Total number of pairs of nodes within a distance d is proportional to d to the power of a constant Privacy and Security Folie Nr. 39

Real World Measurements: World Wide Web Links between documents in the World Wide Web 800 Mio. documents investigated (S. Lawrence, 1999) What was expected so far? Number of links per web page: k ~ 6 Number of pages in the WWW: N WWW ~ 10 9 Probability page has 500 links : P(k=500) ~ 10-99 Number of pages with 500 links: N(k=500) ~ 10-90 Privacy and Security Folie Nr. 40

WWW: result of investigation P(page has k links) P(k pages link to this page) out = 2.45 in = 2.1 P out (k) ~ k - out P in (k) ~ k - in P(k=500) ~ 10-6 N WWW ~ 10 9 N(k=500) ~ 10 3 Privacy and Security Folie Nr. 41

Conclusion: Power Law Networks Power Law relationship for Web pages The probability P(k) that a page has k links (or k other pages link to this page) is proportional to the number of links k to the power of y General Power Law Relationships A certain property k is independent of the growth of the system always proportional to k -a, where a is a constant (often 2 < a < 4) Power laws very common ( natural ) power law networks exhibit small-world-effect (always?) E.g. WWW: 19 degrees of separation (R. Albert et al., Nature (99); S. Lawrence et al., Nature (99)) Also termed: scale-free networks Privacy and Security Folie Nr. 42

Barabasi-Albert-Model How do power law networks emerge? In a network where new vertices (nodes) are added and new nodes tend to connect to well-connected nodes, the vertex connectivities follow a power-law Barabasi-Albert-Model: power-law network is constructed with two rules 1. Network grows in time 2. New node has preferences to whom it wants to connect Preferential connectivity modeled as Each new node wants to connect to m other nodes Probability that an existing node j gets one of the m connections is proportional to its degree d(j) New nodes tend to connect to well-connected nodes Another way of saying this: the rich get richer (deg ) i j deg i deg j Privacy and Security Folie Nr. 45

Properties of Scale-Free Networks Recall: Easy to find paths in small world networks How about robustness and resilience? Further robustness/resilience metrics, classified as: Worst-case connectivity Worst-case distance Average robustness Probabilistic robustness Privacy and Security Folie Nr. 58

Worst-Case Connectivity Metrics Balanced (vertex) cut Minimum number of edges (vertices) removed to achieve a network fragmentation into two equal components Maximum Isolated Component Size Average Isolated Component Size Point of Rupture Minimum number of nodes the removal of which causes the network to fragment into components, with giant component < 0.5* V Privacy and Security Folie Nr. 59

Worst-Case Connectivity Metrics: Example Privacy and Security Folie Nr. 60

Worst-Case Connectivity Metrics Cohesiveness c v = κ G κ G v Defines for each vertex of network to what extent it contributes to connectivity Minimum m-degree Cohesiveness -2 1 Reflects state of the network after disconnection Minimum m-degree fi(m) is smallest number of edges that must be removed to disconnect the network into two connected components G 1 and G 2 where G 1 contain exactly m vertices 1-degree 2-degree 3-degree 4-degree 5-degree 1 2 3 3 3 Privacy and Security Folie Nr. 61

Worst-Case Connectivity Metrics Toughness Let S be a subset of vertices of G and let K(G - S) be the number of internally connected components that G is split into by the removal of S. The toughness of G is then defined as follows S t G = min S V,K G S >1 K(G S) number of internally connected components that graph is broken into by failure of a number of vertices Toughness is high if even removal of large number of vertices splits network only in few components Privacy and Security Folie Nr. 62

Worst-case Distance Metrics Average Connected Distance Characteristic Path Length (CPL) under failure of or attack on nodes CPL: Sum of distances over all pairs of nodes divided by number of pairs Example Before attack: 40/30 = 1,3 After attack: 34/20 = 1,7 Edge Persistence Minimum number of deleted edges that increase network diameter Example: Edge Persistence of 1 as diameter increases to 2 when deleting long-range link Privacy and Security Folie Nr. 63

Resilience of Scale Free Networks Experiment: take network of 10000 nodes (random and power-law) and remove nodes randomly Random graph: Take out 5% of nodes: Biggest component 9000 nodes Take out 18% of nodes: No biggest component, all components between 1 and 100 nodes Take out 45% of nodes: Only groups of 1 or 2 survive Power-law graph: Take out 5% of nodes: Only isolated nodes break off Take out 18% of nodes: Biggest component 8000 nodes Take out 45% of nodes: Large cluster persists, fragments small Networks with power law exponent < 3 are very robust against random node failures ONLY true for random failures! Privacy and Security Folie Nr. 64

Properties of Scale-Free Networks Robustness against random failures = important property of networks with scale-free degree distribution Remove randomly chosen vertex v from: In SF it is a low-degree vertex with high probability => damage to the network small But very sensitive against attacks Adversary removes highest degree vertices first => the network quickly decomposes into very small components Note: random graphs are not robust against random failures, but not sensitive against attacks either (because all vertices more or less have the same degree) Attack nodes Privacy and Security Folie Nr. 65

Resilience of Scale-Free Networks (3) Random failures vs. directed attacks Random Graph Power Law Graph Privacy and Security Folie Nr. 66

The consequence L: Average Connected Distance Privacy and Security Folie Nr. 67

Case Study of Unstructured P2P Networks What do real (unstructured) Peer-to-Peer Networks look like? Depends on the protocols used It has been found that some peer-to-peer networks, e.g., Freenet, evolve voluntarily in a small-world with a high clustering coefficient and a small diameter Analogously, some protocols, e.g., Gnutella, will implicitly generate a scale-free degree distribution Case study: Gnutella network How does the Gnutella network evolve? Nodes with high degree answer more likely to Ping messages Thus, they are more likely chosen as neighbor Host caches always/often provide addresses of well connected nodes Privacy and Security Folie Nr. 68

Gnutella Node degrees in Gnutella follow Power-Law rule Privacy and Security Folie Nr. 69

Gnutella /2 Network diameter stayed nearly constant, though the network grew by one order of magnitude Robustness networks with power law exponent < 3 are very robust against random node failures In Gnutella s case, the exponent is 2.3 Theoretical experiment Subset of Gnutella with 1771 nodes Take out random 30% of nodes, network still survives Take out 4% of best connected nodes, network splinters For more information on Gnutella, see: Matei Ripeanu, Adriana Iamnitchi, Ian Foster: Mapping the Gnutella Network, IEEE Internet Computing, Jan/Feb 2002 Zeinalipour-Yazti, Folias, Faloutsos, A Quantitative Analysis of the Gnutella Network Traffic, Tech. Rep. May 2002 Privacy and Security Folie Nr. 70

Summary The network structure of a networks influences: average necessary number of hops (path length) possibility of greedy, decentralized routing algorithms stability against random failures sensitivity against attacks redundancy of routing table entries (edges) many other properties of the system build onto this network Important measures of a network structure are: average path length the degree distribution clustering coefficient Various resilience metrics (with differing foci) Privacy and Security Folie Nr. 71