Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

Scale Free Networks.
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
Online Social Networks and Media Navigation in a small world.
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
Lecture 21 Network evolution Slides are modified from Jurij Leskovec, Jon Kleinberg and Christos Faloutsos.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Information Networks Small World Networks Lecture 5.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
CS728 Lecture 5 Generative Graph Models and the Web.
Antonis Papadogiannakis
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Small-World File-Sharing Communities Adriana Iamnitchi, Matei Ripeanu and Ian Foster,
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
1 Complex systems Made of many non-identical elements connected by diverse interactions. NETWORK New York Times Slides: thanks to A-L Barabasi.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
CS Lecture 6 Generative Graph Models Part II.
School of Information University of Michigan SI 614 Search in random networks Lecture 16.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Searching in Unstructured Networks Joining Theory with P-P2P.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
Online Social Networks and Media
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Complex network of the brain II Hubs and Rich clubs in the brain
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Peer to Peer Network Design Discovery and Routing algorithms
Aug 22, 2002Sigcomm 2002 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs-research Scott Shenker ICIR.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
A Measurement Study of Peer-to-Peer File Sharing Systems Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems By Stefan Saroiu, P. Krishna Gummadi,
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Models and Algorithms for Complex Networks
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Peer-to-Peer Information Systems Week 12: Naming
On Growth of Limited Scale-free Overlay Network Topologies
Peer-to-Peer and Social Networks
Peer-to-Peer Information Systems Week 6: Performance
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies in Scale-Free Networks by Beom Jun Kim, Chang No Yoon, Seung Kee Han, and Hawoong Jeon By Lada A. Adamic, Amit R. Puniyani*, Rajan M. Lukose, and Bernardo A. Huberman HP Labs and Stanford University* P P PP P P SS SS Q R D P P PP P P Q R P Q Q NapsterGnutella

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:2 Review of Existing File Location Mechanisms Various design objectives –Gnutella: works well for short-lived nodes, highly dynamic environments Haystack –Freenet: provides “anonymity” –CAN, Chord, Pastry, Tapestry: Low, scalable response latency No false negatives Needles Independent of usage behavior –Applied to music sharing communities –What about others? Scientific collaborations Others?

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:3 Questions Do networks/collaboration/file sharing/etc exhibit any particular network patterns (small-world?Scale- Free?Power-Law?Poisson?)?

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:4 High-Energy Physics Collaboration Fermi National Accelerator Laboratory’s D0 experiment: 1000s physicists (not all actively accessing data at any moment), 18 countries, 70+ institutions Small world!

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:5 Exploit Small-World Behavior Kleinberg’s algorithm: –Search in (structured) small-world network –Greedy search: O(log 2 N) –However, works only for particular type of small world Assumes global knowledge

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:6 Search in Dynamic P2P Networks Not possible to know target host –Due to dynamic nature Node storing file not known until a real-time search is performed. No global information about position of target –Not possible to determine forward progress Solution –Central index (e.g. Napster) –Distributed Queries (e.g. Gnutella) –Distributed Directories+Queries (e.g. this paper)

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:7 Power-Law Many communication and social networks have power-law link distributions Containing a few nodes which have a very high degree and many with low degree. The high connectivity nodes play the important role of hubs in communication and networking

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:8 Power-Law Dynamic Generation Starting with a small number (m 0 ) of nodes Add node with m edges at each time step –probability  i of being connected to the existing vertex i is proportional to the connectivity k i of that vertex –k i is the number of directly connected vertices to i. –k i = (k i + 1)/  j (k j + 1) with the summation over the whole network at a given instant. –Constructs scale-free network Ideas based on growth and preferential attachment Shows the power-law behavior in the connectivity distribution. Need path connecting two nodes in the network.

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:9 Search in Power-Law High connectivity can be exploited when designing efficient search algorithms. As shown by AT&T –the out-link degree distribution for a massive graph of telephone calls between individuals has a clean power- law form with an exponent of approximately 2.1. –Reflects the presence of central individuals who interact with many others on a daily basis and play a key role in relaying information.

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:10 Goals Propose local search strategies –Utilize high degree nodes in power-law graphs –Search costs scale sub-linearly with the size of the graph. –Better than random Demonstrate strategies on the Gnutella P2P network.

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:11 Search Algorithms Random –Choose a random neighbor to forward msg. Max –Choose neighbor with highest degree –Requires that local node knows neighbors degree –Effect Short initial climb Continue down degree sequence

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:12 Results I –Scaling of the average search time vs graph size –Max performs better than Random But not as good as analytical mode. Nodes revisted

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:13 Results II –Max finds 50% of nodes in 10 steps It takes 10+2=12 hops to reach 50% of graphs –Average number of hops 217! Large number of 1- or 2- degree nodes

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:14 Power-Law compared to Poisson Poisson graph –All links are randomly distributed (I.e. have same degree) Revisits more likely in power-law graphs. Power-Law Poisson

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:15 Summary of Power-Law Search Start at a random node Follow degree sequence –That is, node with richest links –Followed by node with second richest Scan the maximum number of nodes –Minimum number of steps

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:16 Gnutella Modifications Use Max instead of broadcast –Store index for neighbor files. Results in efficient search for 50% of files. Need rich nodes in CPU,Bandwidth,Storage capacity –The “rich get richer”

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:17 Notes about Power-Law Algorithm created local directories valid within a two hop radius. Network is resilient to random failures More resistant than central server Power-Law in general –More resistant to random failure than poisson –Less resilient to attack on high degree nodes.

P2P Systems 2003©2003 Hakim Weatherspoon/UC BerkeleySearch in Power-Law Networks:18 Closing Questions How is file-sharing different than maintaining personal storage?