Joydeep Chandra, Santosh Shaw and Niloy Ganguly

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
P2P Architecture Case Study: Gnutella Network
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau (Several slides have been taken.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Peer to Peer Network Design Discovery and Routing algorithms
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
The simultaneous evolution of author and paper networks
OPERATING SYSTEMS CS 3502 Fall 2017
Virtual Direction Routing
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
On Growth of Limited Scale-free Overlay Network Topologies
CHAPTER 3 Architectures for Distributed Systems
Peer-to-Peer and Social Networks
Early Measurements of a Cluster-based Architecture for P2P Systems
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Niloy Ganguly, Andreas Deutsch Center for High Performance Computing
Effective Social Network Quarantine with Minimal Isolation Costs
GIA: Making Gnutella-like P2P Systems Scalable
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Improving Performance in the Gnutella Protocol
Department of Computer Science University of York
Lectures on Graph Algorithms: searching, testing and sorting
Peer-to-Peer Information Systems Week 6: Performance
Friendships that last Peer lifespan and its role in P2P protocols
Korea University of Technology and Education
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

Analyzing Network Coverage in Unstructured P2P Networks : A Complex Network Approach Joydeep Chandra, Santosh Shaw and Niloy Ganguly Department of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, India.

Background Most used search and query mechanism in Unstructured P2P Networks is Flooding (or selective flooding) like BFS, k-BFS Gnutella, Kazaa (Use TTL based flood) Thus query and search performance depends on Topology of the network. The network coverage of the peers achieved through flooding. Drawbacks Message Redundancy Wastage of precious bandwidth Our Claim Analyzing topological behavior can help Develop new insights on flooding. Build specialized flood-oriented topologies. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Objectives Analyze the topological behavior of the networks. Based on the given degree distribution of the networks Derive the network coverage of the peers that use TTL-based flooding Observe the impact of topology on the coverage and redundancy of the peers in the network. Apply the developed concepts on real p2p networks Propose necessary topological modifications to improve search efficiency through flooding. Validate the proposed measures on simulated p2p networks. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Methodology Derive a basic model for network coverage in TTL-2 networks Based on the work of Newman et. al. of finding neighborhood distribution in large networks Assumptions Given the degree distribution of the networks Many real p2p networks like Gnutella uses TTL-2 based flood for searching TTL-3 is used for rare searches Refine the basic model for more accurate results Based on derived results, propose suitable modifications to Gnutella protocol. To reduce message redundancy and message complexity. Validate the models and protocols using simulations. Implemented a thread based simulated Gnutella with all basic features. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Network Coverage : Basic Model Based on derivations by Newman et. al. for neighbor distribution in large graphs. Assumptions The degree distribution pk of the network is known. TTL-2 coverage of a node is the sum of its first and second neighbors. The probability that two neighbors of a node are themselves connected is almost zero. Source Node First Neighbors Second Neighbors A hypothetical network for Basic Model 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Network Coverage : Basic Model The degree distribution can be represented using a generating function as G0(x) = p0 + p1x + p2x2 + p3x3 + … Coefficient of xi represents the probability that A randomly selected node will have degree i. Thus G0ʹ(1) = 1p1 + 2p2 + 3p3 + … = z (say) Represents the average degree of the nodes in network Probability that a randomly selected edge leads to a node of excess degree k-1 = kpk/(jpj)= kpk/z Corresponding generating function G1(x) = (kpkxk-1)/z = G0ʹ(x)/ G0ʹ(1) According to power-law property distribution for number of outgoing edges for k independent nodes = [G1(x) ]k So Second Neighbor distribution of a random node = pk[G1(x) ]k = G0(G1(x)) = S(x) (say) 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Network Coverage : Basic Model From previous derivations we get Distribution of first neighbors of a peer = G0(x) Distribution of second neighbors of a peer = S(x) Thus total network coverage of a peer C(x) =G0(x) · S(x) Expected TTL-2 coverage of the network = c= C ʹ(1) Observations Does not reflect the actual network coverage Does not capture the actual topology of the real networks Gives the maximum expected coverage 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Limitations of the basic model Reflects correct behavior only when neighbors of a source node does not form cycles among themselves. But actually real p2p networks behave like social networks Many short length cycles are present Ignores the presence of edges that causes short length cycles We name them as Cross and Back Edges More accurate models need to be developed that captures the effect of these edges. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Network Coverage: Refined Model Assumptions Degree Distribution, pk of the network is known. The actual TTL-2 network coverage of a peer is the number of unique nodes reached by a TTL-2 flood message. All the first neighbors of a node are always unique. So, the objective is to find the number of unique second neighbors The back and cross edge probability, b and c, of the nodes in the network Based on simulation results we observed that for networks, the back and cross edges of a node depend on its degree k. We have later derived models for back and cross edge distributions of nodes, based on their degree k, for various networks. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Network Coverage: Refined Model Major steps of the refined model We derived the distribution of number of non-cross edges of a node with k first neighbors (Γk(x)= Γk,0 + Γk,1x + Γk,2x2 + … ) Then we derived the distribution that out t non-cross edges, the number of edges that leads to unique nodes (say Qt(x)) without being back-edge. The distribution of the actual number of unique peers to which k first neighbors of a peer connect, Ak(x)=t Γk,tQt(x) The distribution for unique second neighbors for any random peer is Ŝ(x) = pk Ak(x) The distribution for total coverage of the network is Ĉ(x) = G0(x)· Ŝ(x) 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Key Observations : Refined Model The refined model, models the network coverage of the peers more accurately as compared to the basic model. The refined model accurately models the network coverage of the peers in a Poisson network for a fixed back/cross edge probability. However, for random networks with arbitrary degree distribution, the model needs to be improved further. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Topological Behavior of Gnutella Based on these observations, we propose a protocol (HPC5) to reduce back/cross edges during bootstrapping. Topology Two tier overlay n/w Ultra peers & leaf peers Basic Search Technique Limited flood based search query TTL(2) for normal searches, TTL(3) for rare searches Dynamic Querying An ultra-peer incrementally forwards a query in 3 steps (TTL(1), TTL(2) & TTL(3)) depending upon response Query Routing Protocol (QRP) Leaf peer creates a hash table of all its files and sends it to neighboring ultra-peers. The super-peers form high number of cross and back edges Thus, flooding can lead to huge traffic redundancy. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Objectives Propose a completely distributed topology generation mechanism that is Efficient Provides better search efficiency Scalable Generates less number of redundant messages Compatible with existing unstructured p2p networks. Our proposed mechanism works on any unstructured topology like , Gnutella, Kazaa etc. We mainly focus on Gnutella. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

HPC5 :Handshake Protocol for Cycle-5 networks Basic Considerations Each peer maintains a list of its 1st and 2nd ultra-peer neighbors. Each ultra-peer exchanges the list of 1st neighbors periodically with its 1st neighbors. Each peer sends the 1st neighbor list to its leaf peers. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

HPC5 A peer A sends a connection request to a peer B such that B is not in A’s 1st or 2nd neighbor set B replies back with List of 1st neighbors a neighborhood acceptance/rejection message Rejection is sent when the maximum connection limit is reached A 1 2 B Connection Request List of 1st neighbors Acceptance/Rejection 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

HPC5 If B rejects A, then A records B’s neighbors and closes connection. If B accepts, A checks at-least one common peer between A’s 2nd neighbor and B’s 1st neighbor If no common peer found, then A adds B as neighbor Else A sends reject connection to B A 1 2 B Connection Request List of 1st neighbors Acceptance/Rejection Reject Check for common peers in 2nd neighbor set of A and 1st neighbor set of B 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Simulations Performance Metrics Message Complexity : Average number of messages required to discover a peer in the overlay network. Network Coverage : The number of unique peers explored during query propagation in limited flooding. We plotted for message complexity and network coverage against size of network. The ultra and leaf peer ratio (U/L) are same as in Gnutella networks 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Simulation Parameters Property Gnutella Simulated Gnutella No. of peers 2000k 100k Ultra peer ratio 15-16% of total peers 15% of total peers Average Diameter of ultra layer 6-7 4-5 Maximum connections Ultra-ultra 32 Ultra-leaf 30 Leaf-ultra 3 Average Connections duu : 25-26 dul : 20-22 dlu : 3-4 duu : 22-23 dul : 17-18 dlu : 3 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Search Performance TTL(2) without QRP For cycle-5 network coverage is 10% more in ultra-peers than cycle-3 networks. For cycle-5 message complexity is almost 30% less than cycle-3 networks 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Conclusion We derived suitable models to quantify the coverage of peers in networks that perform TTL-2 searches. Reflected a relation between the topology and the achievable search performance. The derived model provided an insight of The top0logical impact of network coverage and message complexity in Gnutella. Proposed a modified bootstrap protocol for Gnutella that Shows improved network coverage Improves the message complexity. 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg

Future Works Develop suitable models for deriving back and cross edges. Propose distributed methods to classify back and cross edges. Thank you Danke Schoen niloy@cse.iitkgp.ernet.in 1/3/2019 www.cse-web.iitkgp.ernet.in/~cnerg