a visualization-driven approach to overlay-underlay ... · pdf filea visualization-driven...

Download A Visualization-Driven Approach to Overlay-Underlay ... · PDF fileA Visualization-Driven Approach to Overlay-Underlay Engineering? Vinay Aggarwal1, Anja Feldmann1, Robert Gorke¨

If you can't read please download the document

Upload: phungdung

Post on 06-Feb-2018

241 views

Category:

Documents


1 download

TRANSCRIPT

  • A Visualization-Driven Approach to Overlay-UnderlayEngineering?

    Vinay Aggarwal1, Anja Feldmann1, Robert Gorke2, Marco Gaertler2, and DorotheaWagner2

    1 Deutsche Telekom Laboratories / TU Berlin, Germany{vinay.aggarwal, anja.feldmann}@telekom.de

    2 Universitat Karlsruhe (TH), Germany{rgoerke,gaertler,wagner}@ira.uka.de

    Abstract. Overlay applications are popular as they provide high-level functionality by maskingthe intrinsic complexity of the underlay network. However, overlays rely on the underlay to pro-vide them with basic connectivity. Therefore, the intrinsic features of the underlay network deter-mine the efficiency of the overlay. Accordingly, studying the interdependency of the overlay andunderlay networks leads to a better understanding of overlay application behaviour. We present avisualization-driven analysis technique for evaluating the overlay architecture with respect to theunderlay, inspired by the goal of overlay engineering. Using Gnutella as a case study, our analysisconfirms that Gnutella topology differs from a randomly generated network and that there is animplicit correlation between the overlay and underlay topologies.

    1 Introduction

    In recent times, the design of many real-world applications has changed from a mono-lithic structure to modular, yet highly customizable services. As an implementationfrom scratch is usually too time-consuming and expensive, these services are superim-posed as an overlay on an already existing underlay infrastructure.

    A well-known example arises in logistics. The highways and streets we use every-day constitute a huge transport network. However, traffic in this network is far fromstructured. In fact, countless companies and institutions rely on this network to accom-plish their regular shipping of commodities and services, and by doing so, they causethe traffic on the road network to develop in certain patterns. In technical terms theroad network constitutes an underlay network while the commodity exchange networkof a set of companies implicitly building upon this network forms an overlay network.The overlay network uses the underlay to actually realize its tasks.

    Another underlay network of prime interest is the Internet, which serves as theworkhorse of countless data transfers, multimedia services and filesharing protocols.Almost anytime we use the Internet, we participate in some overlay network that usesthe physical Internet (comprised of routers, links, cables, wires) to actually conveythe data packets. Interestingly enough, the Internet itself is an overlay built over thetelephone network underlay. Within the Internet, a particular breed of overlays thathas received a lot of attention lately are peer-to-peer (P2P) applications [25], whichrange from file-sharing systems like Gnutella and Bittorrent, to real-time multimediastreaming like IPTV, to VoIP phone systems like Skype and GoogleTalk. To get abetter perspective on the importance of overlays in our life, consider that the mentioned

    ? The authors gratefully acknowledge financial support from the European Commission within FET Open ProjectsDELIS (contract no. 001907) and the DFG under grant WA 654/13-3.

  • Internet applications currently comprise almost 75% of Internet traffic [15] and willcontinue to dominate the Internet in the next generation, collectively referred to asWeb2.0. Such is the effect of overlays in todays Internet, that many studies [27] havecontemplated that the underlay (physical Internet infrastructure) will just become a bit-pipe and almost all services employed by us will be realised through overlays, whichwill interact with the underlay as well as different overlays running over the sameunderlay.

    Clearly, there is a crucial interdependence between overlay and underlay networks.In particular, the emergence of overly networks heavily affects and poses new require-ments on the underlay. The major advantage of overlays is that they provide high-levelfunctionality while masking the intrinsic complexity of the implementation realizedin the underlay structure. However, this abstraction entails a certain trade-off, namelyindependence versus performance. To gain a deeper understanding of the interdepen-dency between the overlay and the underlay, this trade-off needs to be included in thecorresponding analysis.

    Due to the explosive growth of P2P file sharing applications with respect to to-tal Internet traffic [25], there has been an unprecedented interest in their analysis [2,3, 23]. There have also been attempts to investigate the overlay-underlay correlationsin P2P systems. Using game theoretic models, [18] studies the interaction betweenoverlay routing and traffic engineering within an Autonomous System (AS). An anal-ysis of routing around link failures [23] finds that tuning underlay routing parametersimproves overlay performance. Most investigations tend to point out that the overlaytopology does not appear to be correlated with the underlay (e.g., [2]), but the routingdynamics of the underlay do affect the overlay in ways not yet well understood. Toaddress the apparent lack of overlay-underlay correlation, some schemes, e.g. [19, 20],have been proposed. More recently, [3] has made a case for collaboration betweenISPs and P2P systems as a win-win solution for both.

    In this paper, we approach the problem of modelling overlay-underlay correlationsusing a visualization-driven approach [7], to analyze the overlay in the context of theunderlay network. We briefly survey techniques from analytic visualzation and presentthe used approaches in Section 2. In the following Section 3 our theoretical modelis introduced, alongside some examples. We then demonstrate the application of ourtechnique on a case study to study the correlation of Gnutella with the AS network,as well as to compare Gnutella with a random network in Section 4. We first explainhow we sample the P2P network, followed by a comparison of the P2P network withrandom networks. After pointing out several possible directions for sensitivity analysisof the artificial generation of communications, we conclude in Section 5.

    2 Analytic Visualization

    Sets of data arising in a diversity of research areas exhibit a growing degree of com-plexity and depth of properties. In addition to their automatic procession, one of thecentral emerging challenges is the combination of extracting relevant information fromthe data and at the same time, representing it in a way well-perceivable by a human.Traditionally these two aspects are handled separately: data analysis and its more spe-cific subject of network analysis concerns itself with the identification and the com-

  • putation of relevant pieces of information; while visualization focuses on perceivablerepresentations of networks. However, a fusion of the corresponding techniques sup-ports the intuitive perception of known facts and enables the discovery of novel andyet unknown characteristics. Many network analysis techniques highly benefit from,or even depend on such information about structural properties of a network, in orderto properly guide or find starting points for an analysis.

    Along the more general issues in the field of information visualization, visualiza-tions of large networks naturally (and specifically) suffer a trade-off between the levelof detail and the amount of visible information. In other words, a detailed represen-tation of a graph often antagonizes the immediate perceptibility of abstract analyticinformation. A key task of the analytic visualization of complex networks is to tacklethe task of detailing a visualization while supporting high readability.

    2.1 Decompostition Techniques

    A common approach many visualization techniques rely on, is to decompose the inputnetwork in order to extract the general structure which then serves as a blueprint forthe drawing technique. Generally this leads to the task of partitioning or clustering thenetwork, which is a field of ample diversity. For an overview of clustering techniqueswe refer the reader to [8].

    A concept related to density-based clustering is cores [5, 24], which yield a hier-archical decomposition of the network and can be computed in linear runtime with asimple implementation, in contrast to many other clustering techniques. Briefly, the k-core of an undirected graph is defined as the unique subgraph obtained by recursivelyremoving all nodes of degree less than k. A node has coreness `, if it belongs to the`-core but not to the (`+1)-core. The `-shell is the collection of all nodes having core-ness `. The core of a graph is the non-empty k-core such that the (k+1)-core is empty.Generally the core decomposition of a graph results in disconnected sub-graphs, butin the case of the Internet Autonomous System (AS) network we observe that all k-cores stay connected, which is a good feature regarding connectivity. Cores have beenfrequently used for network analysis, e. g., [10, 11], due to the fact that cores can becomputed efficiently in linear time and space.

    2.2 Approaches to Analytic Visualization

    In the past, several layout techniques have been developed driven by the ambitiousgoal to properly visualize complex networks such as the AS network. Two importantapproaches are the landscape metaphor [7] and network fingerprinting [4], examples ofwhich are shown in Fig. 1 and Fig. 2, respectively. Introduced by Baur et al., the formermodifies a conventional layout technique by a framework of underlying constraintsthat are based on analytic properties. The global shape of the network is induced bythe position of structurally important elements, which automatically conceal inferiorparts. Thus, it reflects the landscape of importance, either in two or three dimensions.The latter approach, LaNet-vi [4] uses analytic properties to define a suitable globalshape, which in this cas