Technology Diffusion in Communication Networks

In the rich and growing literature on diffusion and cascade effects in social networks, it is assumed that a node’s actions are influenced only by its immediate neighbors in the social network. However, there are other contexts in which this highly-local view of influence is not applicable. The diffusion of technologies in communication networks is one important example; here, a node’s actions should also be influenced by remote nodes that it can communicate with using the new technology. We propose a new model of technology diffusion inspired by the networking literature on this topic. Given the communication network G(V, E), we assume that node u activates (i.e., deploys the new technology) when it is adjacent to a connected component of active nodes in G of size exceeding node u’s threshold θ(u). We focus on an algorithmic problem that is well understood in the context of social networks, but thus far has only heuristic solutions in the context of communication networks: determining the smallest seedset of early adopter nodes, that once activated, cause a cascade that eventually causes all other nodes in the network to activate as well. Our main result is a near-optimal approximation algorithm that returns a seedset that is an O(r` log |V |)-factor larger than then the optimal seedset, where r is the graph diameter and each node’s threshold can take on one of at most ` possible values. Our results highlight the substantial algorithmic difference between our problem and the work in diffusion on social networks.

[1]  Noga Alon,et al.  Algorithmic construction of sets for k-restrictions , 2006, TALG.

[2]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[3]  Ion Stoica,et al.  Modeling the adoption of new network architectures , 2007, CoNEXT '07.

[4]  Roch Guérin,et al.  Fostering IPv6 migration through network quality differentials , 2010, CCRV.

[5]  Adrian Perrig,et al.  Modeling adoptability of secure BGP protocols , 2006, SIGMETRICS '06/Performance '06.

[6]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[7]  L. Jean Camp,et al.  Diffusion and Adoption of IPv6 in the Arin Region , 2008 .

[8]  Zhi-Li Zhang,et al.  Dynamics of competition between incumbent and emerging network technologies , 2008, NetEcon '08.

[9]  Adrian Perrig,et al.  Modeling adoptability of secure BGP protocol , 2006, SIGCOMM 2006.

[10]  Sharon Goldberg,et al.  Protocols and Lower Bounds for Failure Localization in the Internet , 2008, EUROCRYPT.

[11]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[12]  David P. Williamson,et al.  The Design of Approximation Algorithms , 2011 .

[13]  James B. Orlin,et al.  A faster algorithm for finding the minimum cut in a graph , 1992, SODA '92.

[14]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[15]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's internet , 2005, TNET.

[16]  Ning Wang,et al.  Provisioning for interdomain quality of service: the MESCAL approach , 2005, IEEE Communications Magazine.

[17]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[18]  Stuart E. Schechter,et al.  Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.

[19]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[20]  B. Briscoe,et al.  Metcalfe's law is wrong - communications networks increase in value as they add members-but by how much? , 2006, IEEE Spectrum.

[21]  Mark S. Granovetter Threshold Models of Collective Behavior , 1978, American Journal of Sociology.

[22]  C. Shapiro,et al.  Technology Adoption in the Presence of Network Externalities , 1986, Journal of Political Economy.

[23]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[24]  Benjamin Edelman Running Out of Numbers: Scarcity of IP Addresses and What to Do about It , 2009, AMMA 2009.