Architectural features of the power-law random graph model of Internet: notes on soft hierarchy, vulnerability and multicasting

Ilkka Norros, Hannu Reittu

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    The so-called power-law random graph (PLRG) has recently turned out to be an interesting model for very large, Internet-like networks. The resulting network possesses a kind of "soft hierarchy'', where large nodes play the role of a core network providing very good connectivity properties. In this paper, we study with simulations several aspects of the PLRG model. We check to what extent the shortest paths between randomly selected nodes really go through the core, propose a new way of adding link capacity diversity to the core by what we call natural routing, study the vulnerability of the network against node losses, and discuss the implications of the model to the efficiency of multicasting.
    Original languageEnglish
    Title of host publicationProviding Quality of Service in Heterogeneous Environments
    Subtitle of host publicationProceedings of the 18th International Teletraffic Congress - ITC18
    EditorsJ. Charzinski, R. Lehnert, P. Tran-Gia
    PublisherElsevier
    Pages131-140
    ISBN (Print)978-0-444-51455-4
    DOIs
    Publication statusPublished - 2003
    MoE publication typeA4 Article in a conference publication
    Event18th International Teletraffic Congress, ITC 18 - Berlin, Germany
    Duration: 31 Aug 20035 Sept 2003

    Publication series

    SeriesTeletraffic Science and Engineering
    Volume5
    ISSN1388-3437

    Conference

    Conference18th International Teletraffic Congress, ITC 18
    Country/TerritoryGermany
    CityBerlin
    Period31/08/035/09/03

    Keywords

    • random graph
    • power-law
    • multicasting
    • vulnerability

    Fingerprint

    Dive into the research topics of 'Architectural features of the power-law random graph model of Internet: notes on soft hierarchy, vulnerability and multicasting'. Together they form a unique fingerprint.

    Cite this