The comparative analysis of big networks with various network topologies

Similar documents
Slim Fly: A Cost Effective Low-Diameter Network Topology

Small-World Datacenters

Congestion Control in Mobile Ad-Hoc Networks

Investigation on OLSR Routing Protocol Efficiency

Throughput Models of Interconnection Networks: the Good, the Bad, and the Ugly

Performance Analysis of MANET Routing Protocols OLSR and AODV

Algorithms for minimum m-connected k-tuple dominating set problem

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

A Dynamic TDMA Protocol Utilizing Channel Sense

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Jellyfish: Networking Data Centers Randomly

Jellyfish. networking data centers randomly. Brighten Godfrey UIUC Cisco Systems, September 12, [Photo: Kevin Raskoff]

CSCI 5454 Ramdomized Min Cut

A Cost and Scalability Comparison of the Dragonfly versus the Fat Tree. Frank Olaf Sem-Jacobsen Simula Research Laboratory

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

4. Networks. in parallel computers. Advances in Computer Architecture

Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Algorithms for Minimum m-connected k-dominating Set Problem

Parallel Routing Method in Churn Tolerated Resource Discovery

System Energy Efficiency Lab seelab.ucsd.edu. Jinseok Yang

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS

Physical Organization of Parallel Platforms. Alexandre David

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS

Effect of Links on DHT Routing Algorithms 1

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Data Center Network Topologies II

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

Research on Transmission Based on Collaboration Coding in WSNs

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On minimum m-connected k-dominating set problem in unit disc graphs

Parallel Architectures

Association Rules Mining using BOINC based Enterprise Desktop Grid

CSMA based Medium Access Control for Wireless Sensor Network

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

INTERCONNECTION NETWORKS LECTURE 4

Efficient Communication in Metacube: A New Interconnection Network

A Fault Tolerant Approach for WSN Chain Based Routing Protocols

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

Random Regular Graph & Generalized De Bruijn Graph with k-shortest Path Routing

Design of Scalable Network Considering Diameter and Cable Delay

Rumor Routing Algorithm

Location-aware In-Network Monitoring in Wireless Sensor Networks

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS

Simulating DataCenter Network Topologies. Suraj Ketan Samal Upasana Nayak

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

Multilevel Fault-tolerance for Designing Dependable Wireless Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

SHARED MEMORY VS DISTRIBUTED MEMORY

A Connection between Network Coding and. Convolutional Codes

NECO: Network Coding Simulator

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Methodology of Searching for All Shortest Routes in NoC

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control

Fault tolerant Multi Cluster head Data Aggregation Protocol in WSN (FMCDA)

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers

FCell: Towards the Tradeoffs in Designing Data Center Network Architectures

Routing in Delay Tolerant Networks (DTN)

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

Cloud networking (VITMMA02) DC network topology, Ethernet extensions

Fault-tolerant in wireless sensor networks using fuzzy logic

Introduction to Parallel Programming

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

PAPER Node-Disjoint Paths Algorithm in a Transposition Graph

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks

Lecture 7: Parallel Processing

Utilizing Datacenter Networks: Centralized or Distributed Solutions?

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers

s-t Graph Cuts for Binary Energy Minimization

Scalability and Classifications

Early Measurements of a Cluster-based Architecture for P2P Systems

Network-on-chip (NOC) Topologies

Some Problems of Fuzzy Modeling of Telecommunications Networks

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers

Analysis Range-Free Node Location Algorithm in WSN

SmartGossip: : an improved randomized broadcast protocol for sensor networks

Lecture 2: Topology - I

Interconnection Network. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

Transcription:

The Seventh International Conference on Network Analysis NET 2017 22-24 June 2017, Nizhniy Novgorod, Russia 1 The comparative analysis of big networks with various network topologies Ilya Kurochkin 12, Alexandra Prun 1, Pavel Ivanov 2 1 Institute for information transmission problems of Russian academy of sciences 2 National university of science and technology MISiS

Base networks topologies 2

3 Cisco telecommunication network design scheme * from ciscopress.com

4 Distance between nodes Max distance(diameter) = less than 4-5 edges in route

Threshold of order of vertex 5

6 Network topologies for big corporative networks (datacenter, supercomputer et al.) Fat tree N-dimensional torus N-dimensional grid Hypercube Dragonfly Jellyfish All-connected topology

All-connected network topology 7

Grid 8

Torus 9

10 Hypercube 4 2 4 3 5

11 FatTree All-known and useful network topology Better for big networks than classical tree Restriction of vertex order is possible The fault tolerance network topology but is sensitive to multiple failures

FatTree 12

JellyFish 13

14 JellyFish Stochastic network topology Simple to add or delete nodes Restriction of vertex order is possible Fault tolerance and scalable network topology

DragonFly 15

16 DragonFly Hierarchical network topology Restriction of vertex order is possible Fault tolerance and scalable network topology

17 Attempts to comparative analysis different network topologies Singla, A., Hong, C. Y., Popa, L., & Godfrey, P. B. (2012, April). Jellyfish: Networking Data Centers, Randomly. In NSDI (Vol. 12) Williams, B., & Camp, T. (2002, June). Comparison of broadcasting techniques for mobile ad hoc networks. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing ACM. Li, M., Li, Z., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12) Raveau, S., Guo, Z., Muñoz, J. C., & Wilson, N. H. (2014). A behavioural comparison of route choice on metro networks: Time, transfers, crowding, topology and socio-demographics. Transportation Research Part A: Policy and Practice, 66

18 Parameters for comparative analysis Group 1. Parameters of initial graph Group 2. Results of network simulation Network size Network diameter Network resource Percent of nonnull edges Min/mean/max capacity of edges Et al. Total flow refusals Values of min cuts between pairs (Source- Target) Parameters of end graph Et al.

19 Network model Telecommunication network consisting of commutation nodes(vertices) and communication edges with limited capacities Network has set of pairs(source-target) and Set of sequence requests for flow route which have to be sent from one vertex(source node) to another (target node) Model has discrete time (timeticks) Main goal maximized total flow before refusal (first or total)

20 Network + set of requests Let G(A, B) be a network graph consisting of N vertices A 1, A 2,,A N, and K edges B 1,,B K, with b k >0, k=1,2,,k, capacities. And set of pairs Source-Target (S i ; T i ), i=1,2, P, S i,t i A, P N(N-1)/2 Set of request for commodity flow set Order j (PairNumber, StartTime, LifeTime, FlowSize), j=1,2,,r Requests arrive sequentially in time Total flow j FlowSize j for the satisfied requests only Used centralized dynamical routing

21 Prepare data for simulation Generate network graph with certain network topology Select set of pairs (Source-Target) Genearate set of requests Order j with properties StartTime (random values with combination of exponential and uniform distributions) LifeTime (random values with normal distribution) FlowSize (random values with uniform distribution)

22 Check of adequacy of parameters Max of mincuts Theoretical assessment of network loading Flow Mean of mincuts Min of mincuts Time ticks

One more method for comparative analysis 23

24 Algorithms for minimal cuts Algorithms for determine values of minimal cuts o Ford-Falkerson algorithm o Edmonds-Karp modification o Dinits algorithm o Karzanov algorithm Algorithms for determine set of edges of minimal cuts set o Karger algorithm o Stoer-Wagner algorithm Algorithms for determine each minimal cut o Timofeev-Karzanov algorithm

Initial parameters for simulation 25 vetrices Order of vertex FatTree pair (S,T) timeticks in simulation requests 40 4 100 22960 75000 vetrices Order of vertex JellyFish pair (S,T) timeticks in simulation requests 40 4 100 22960 75000 vetrices Order of vertex DragonFly pair (S,T) timeticks in simulation requests 40 4 100 22960 75000

26 Parameters of graph (in the moment) 16 14 12 10 8 6 Min edge capacity 14 1010 1000 990 980 970 Max edge capacity 1000 967 990 4 2 0 1 1 FatTree JellyFish DragonFly 960 950 FatTree JellyFish DragonFly 100 90 80 70 60 50 40 30 20 10 0 Percent of attain pairs(source-target) 39 92 92 FatTree JellyFish DragonFly 90 80 70 60 50 40 30 20 10 0 nonnull edge 80 77 63 FatTree JellyFish DragonFly

27 Preliminary results of simulation processed requests refusal requests FatTree nonnull edges (start) nonnull edges (stop) 22949 13774 63 57 processed requests refusal requests JellyFish nonnull edges (start) nonnull edges (stop) 30701 4098 80 66 processed requests refusal requests DragonFly nonnull edges (start) nonnull edges (stop) 28520 3778 77 69

28 Example of preliminary results 18 Capacity reduction in % 16 15.7 14 12 10.7 10 9.2 8 6 4 2 0 FatTree JellyFish DragonFly

29 Use in distributed computing The BOINC platform (Berkeley Open Infrastructure for Network Computing) is an open noncommercial software for the organization of the voluntary distributed computing on personal computers. For tasks of high computing complexity the versions for usage in multiprocessor systems and the version for the distributed computing on BOINC platform NetMax@home is implemented.

30 Conclusions Modified technique for comparative analysis of networks with various network topology is given Define groups of estimate parameters for comparative analysis Generators of network topology are realized Usefulness of the parameters characterizing the minimum sections is confirmed In future: Define more parameters Big experiment for DragonFly, JellyFish and FatTree networks topologies

31 Thank you for attention Centre for distributed computing Institute for information transmission problem Russian academy of sciences (IITP RAS) web: distributed-computing.ru e-mail: kurochkin@iitp.ru, qurochkin@gmail.com