Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.

Slides:



Advertisements
Similar presentations
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Advertisements

Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Price Of Anarchy: Routing
CLive Cloud-Assisted P2P Live Streaming
A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves Fabian Kuhn, Microsoft Research, Silicon Valley Stefan.
Fabian Kuhn, Microsoft Research, Silicon Valley
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Paper By : Ram Ramanathan, Regina Resales-Hain Instructor : Dr Yingshu Li.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Churn and Selfishness: Two Peer-to-Peer Computing Challenges Invited Talk University of California, Berkeley 380 Soda Hall March, 2006 Stefan Schmid Distributed.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distributed Computing Group On the Impact of Malicious Players in Distributed Systems Stefan Schmid DYNAMO’07: 1st Workshop on Dynamic Networks (Salerno,
Economics of P2P Computing Stefan Schmid Distributed Computing Group.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Oberseminar TU München,
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Visit at Los Alamos National.
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Distributed Computing Group Keno Albrecht Ruedi Arnold Michael Gähwiler Roger.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
On Thieves and Terrorists in Peer-to-Peer Systems Stefan Schmid Distributed Computing Group.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Localized Self- healing using Expanders Gopal Pandurangan Nanyang Technological University, Singapore Amitabh Trehan Technion - Israel Institute of Technology,
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Network Aware Resource Allocation in Distributed Clouds.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Representing and Using Graphs
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Network Coordinates : Internet Distance Estimation Jieming ZHU
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
Self-stabilizing energy-efficient multicast for MANETs.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Data Center Network Architectures
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Local Connection Game.
DHT Routing Geometries and Chord
Network Formation Games
The Price of Routing Unsplittable Flow
Network Formation Games
Presentation transcript:

Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group ETH Zurich, Switzerland Talk based on our papers at IPTPS 2005 and 2006

Stefan Dagstuhl Outline of this Talk Current research of our group at ETH –Based on our papers at IPTPS 2005 and IPTPS 2006 –Still many interesting open questions! Two challenges related to P2P topologies CHALLENGE 1: Dynamic Peers dynamics of P2P systems, i.e., joins and leaves of peers (“churn”) our approach to maintain desirable properties in spite of churn CHALLENGE 2: Selfish Peers impact of selfish behavior on P2P topologies How bad are topologies formed by selfish peers? Stability of topologies formed by selfish peers?

Stefan Dagstuhl CHALLENGE 1: Dynamic Peers

Stefan Dagstuhl Motivation (1)  Peers may join and leave the network at any time and concurrently (“churn”)! P2P systems are –composed of unreliable desktop machines –under control of individual users However: –many systems maintain their properties only in static environments!

Stefan Dagstuhl Motivation (2) How to maintain desirable properties such as –Connectivity, –Network diameter, –Peer degree?

Stefan Dagstuhl A First Approach What if number of peers is not 2 i ? How to prevent degeneration? Where to store data? Idea: Simulate the hypercube! Fault-tolerant hypercube?

Stefan Dagstuhl Simulated Hypercube System Basic components: Simulation: Node consists of several peers! Route peers to sparse areas Adapt dimension Token distribution algorithm! Information aggregation algorithm!

Stefan Dagstuhl The Adversary Model worst-case faults with an adversary ADV(J,L, ) ADV(J,L, ) has complete visibility of the entire state of the system May add at most J and remove at most L peers in any time period of length Note: Adversary is not Byzantine!

Stefan Dagstuhl Results In spite of ADV(O(log n), O(log n), 1): –always at least one peer per node (no data lost!), –peer degree O(log n) (asymptotically optimal!), –network diameter O(log n).

Stefan Dagstuhl Discussion Simulated topology: Taming dynamic peers by redundancy! Simulated topology: A simple blueprint for many P2P topologies! –Requires token distribution and information aggregation on the topology! A lot of future work! –A first step only: dynamics of P2P systems offer many research challenges! –E.g.: Other dynamics models, self-stabilization after larger changes, etc.!

Stefan Dagstuhl CHALLENGE 2: Selfish Peers

Stefan Dagstuhl Challenge 1 -> Challenge 2 Simulated hypercube topology is fine… … if peers act according to protocol! However, in practice, peers can perform selfishly!

Stefan Dagstuhl Motivation (1) –CPU Cycles –Memory –Bandwidth –…–… Power of Peer-to-Peer Computing = Accumulation of Resources of Individual Peers Collaboration is of peers is vital! However, many free riders in practice!

Stefan Dagstuhl Motivation (2) Free riding –Downloading without uploading –Using storage of other peers without contributing own disk space –Etc. Our research: selfish neighbor selection in unstructured P2P systems Goals of selfish peer: (1)Maintain links only to a few neighbors (small out-degree) (2)Small latencies to all other peers in the system (fast lookups) What is the impact on the P2P topologies?

Stefan Dagstuhl Problem Statement (1) n peers {  0, …,  n-1 } distributed in a metric space –Metric space defines distances between peers –triangle inequality, etc. –E.g., Euclidean plane Metric Space

Stefan Dagstuhl Problem Statement (2) Each peer can choose… –to which –and how many –… other peers its connects ii Yields a directed graph G

Stefan Dagstuhl Problem Statement (3) Goal of a selfish peer: (1)Maintain a small number of neighbors only (out-degree) (2)Small stretches to all other peers in the system - Only little memory used - Small maintenance overhead –Fast lookups! –Shortest distance using edges of peers in G… –… divided by shortest direct distance

Stefan Dagstuhl Cost of a peer: –Number of neighbors (out-degree) times a parameter  –plus stretches to all other peers –  captures the trade-off between link and stretch cost cost i =  outdeg i +  i  j stretch G (  i,  j ) Problem Statement (4) Goal of a peer: Minimize its cost!

Stefan Dagstuhl Game-theoretic Tools (1) Social Cost –Sum of costs of all individual peers: –=> Criterion to evaluate the overall efficiency of a P2P topology! Cost =  i cost i =  i (  outdeg i +  i  j stretch G (  i,  j )) Social Optimum OPT –Topology with minimal social cost of a given problem instance –=> “topology formed by collaborating peers”! Nash equilibrium –“Result” of selfish behavior => “topology formed by selfish peers” –Topology in which no peer can reduce its costs by changing its neighbor set –In the following, let NASH be social cost of worst equilibrium

Stefan Dagstuhl Game-theoretic Tools (2) How to compute the impact of selfish behavior? Price of Anarchy –Captures the impact of selfish behavior by comparison with optimal solution –Formally: social costs of worst Nash equilibrium divided by optimal social cost PoA = max I {NASH(I) / OPT(I)}

Stefan Dagstuhl Results: Price of Anarchy Theorem: The price of anarchy is PoA 2  min{ ,n}) This is already true in a 1-dimensional Euclidean space: - Is Nash equilibrium, at has large social costs compared to doubly linked list 11 22 33 44 55  i-1 ii  i+1 nn ½  ½  2 33 ½  4 ½  i-2  i-1 ½i½i ½  n-1 … … … … Peer: Position: => PoA can grow linearly in the total number of peers => PoA can grow linearly in the relative importance of degree costs 

Stefan Dagstuhl Results: Stability Theorem: Even in the absence of churn, peer mobility or other sources of dynamism, the system may never stabilize (i.e., P2P system never reaches a pure Nash equilibrium)! How long thus it take until no peer has an incentive to change its neighbors anymore?

Stefan Dagstuhl Discussion Unstructured topologies created by selfish peers Efficiency of topology deteriorates linearly in the relative importance of links compared to stretch costs, and in the number of peers Instable even in static environments Discussion –Relevance in practice? –If yes: How to tame the selfish peers? –Mechanism design?

Stefan Dagstuhl Taming Dynamic and Selfish Peers Thank you for your attention! Further reading: 1.“A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn”, Kuhn, Schmid, Wattenhofer; Ithaca, New York,USA, IPTPS “On the Topologies Formed by Selfish Peers”, Moscibroda, Schmid, Wattenhofer; Santa Barbara, California, USA, IPTPS Website: Questions? Comments? Feedback?