IEEE P2P, Aachen, Germany, September 2008 1 Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu

Slides:



Advertisements
Similar presentations
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Advertisements

IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.
Information Networks Small World Networks Lecture 5.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Small-world Overlay P2P Network
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Rivers of the World are Small-World Networks Carlos J. Anderson David G. Jenkins John F. Weishampel.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Small World Networks Somsubhra Sharangi Computing Science, Simon Fraser University.
LSDS-IR’08, October 30, Peer-to-Peer Similarity Search over Widely Distributed Document Collections Christos Doulkeridis 1, Kjetil Nørvåg 2, Michalis.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Agent-Organized Networks for Dynamic Team Formation Gaton, M.E. and desJardins, M., In Proceedings of AAMAS-2005, pp Seo, Young-Woo.
Searching in Unstructured Networks Joining Theory with P-P2P.
Department of Computer Engineering Koc University, Istanbul, Turkey
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
Computer Science 1 Web as a graph Anna Karpovsky.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
September 25, 2007IEEE Nano-Net, Catania, Italy1 Networking Behavior in Thin Film and Nanostructure Growth Dynamics Tansel Karabacak U of Arkansas – Little.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks Presenter: 游創文.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Virtual Direction Routing
On Growth of Limited Scale-free Overlay Network Topologies
Presentation transcript:

IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu Los Alamos National Laboratory Durgesh Kumari Murat Yuksel University of Nevada – Reno

IEEE P2P, Aachen, Germany, September Outline Motivation Topology Generation Mechanisms Barabási-Albert (Preferential Attachment) Model Our Model with Local Info, Hard Cutoffs, and Churn Search Methods Flooding Normalized Flooding Random Walk Summary and Conclusions

IEEE P2P, Aachen, Germany, September Motivation: Scale-Free Topologies Characterization is free of the system size N (i.e., scale).

IEEE P2P, Aachen, Germany, September Motivation Diameter d Exponent  Number of stubs m O(lnln N)(2,3)≥1 O(ln N/lnln N)3≥2 O(ln N)31 >3≥1 Search Efficiency vs. Exponent and Connectedness Ultra-small Small-world Characteristics of the p2p overlay topology has significant effects on the search performance.

IEEE P2P, Aachen, Germany, September Motivation Key Question: How to construct the overlay topology by using local information in p2p nets such that the search efficiency is good? Scale-freeness (i.e. power-law exponent) is related to search efficiency Key Constraints: No global knowledge No peer wants to take on the load – hard cutoff on the degree Local decisions affecting global behavior: When a new peer joins, how should it construct its list of neighbors? When a new peer leaves, how should its neighbors rewire themselves to the network?

IEEE P2P, Aachen, Germany, September Topology Generation Model: Preferential Attachment w/ Hard Cutoff How to construct a scale-free topology? Preferential Attachment (PA) Include an existing peer with probability proportional to its current degree. prefer the peers with larger degree Requires global info ? Hmmm. Which node to have as a neighbor? Degrees Prob. of Attachment We revise PA such that a node with maximum allowed degree (i.e., hard cutoff) is skipped. And the procedure is tried again..

IEEE P2P, Aachen, Germany, September Topology Generation Model: Parameters Parameters of our topology construction framework Probability of a node going down/leaving. Horizon of available state information at join. Horizon of available state information at leave. Maximum degree a node is allowed to have.

IEEE P2P, Aachen, Germany, September Topology Generation Model: Join w/  j Join() procedure: Select a node J to start with Collect J’s neighborhood topology information within  j hops Apply PA on the  j sub- topology until m links are established If m is larger than the nodes in the subtopology, repeat the procedure again until m links are established. Hmmm. Which m nodes to have as a neighbor? J

IEEE P2P, Aachen, Germany, September Topology Generation Model: Rewiring w/  l after a Leave Leave() procedure: Select a node L to delete Collect L’s neighborhood topology information within  l hops Let the  l sub-topology information be available to L’s 1-hop neighbors, r 1 and r 2 With L’s information and r 1 or r 2 being removed r 1 and r 2 apply PA on their  l sub-topology until the lost link is restored with another peer L r2r2 r1r1

IEEE P2P, Aachen, Germany, September Topology Generation Model: Growth with Joins and Leaves Topology growth process calls Join() or Leave() procedures depending on the amount of churn. At every iteration: Call Join() Call Leave() with a probability  Keep this iteration going until the target network size is reached Both the Join() and Leave() procedures assure that degrees of nodes are less than the hard cutoff Higher  means more churn. A peer is added at every iteration.

IEEE P2P, Aachen, Germany, September Degree Distributions,  =0 m=1, k c =50 m=1, no cutoff Increase in  j shifts degree distribution from Exponential to scale-free.

IEEE P2P, Aachen, Germany, September Degree Distributions,  =0 m=3, k c =50 m=3, no cutoff Lesson: Force peers to have a larger m to reduce the need for large  j. Larger m makes the shift less apparent.

IEEE P2P, Aachen, Germany, September Degree Distributions,  =0.3 m=1, k c =50 m=1, no cutoff Hard cutoff does not affect this distribution shift.. Contribution of  l in shifting the degree distribution is more significant.

IEEE P2P, Aachen, Germany, September Search Methods Flooding Source node sends a message to all its neighbors and every node which receives the message forwards it to all its neighbors except the node the message is received from until the target node receives the message Normalized flooding Similar to flooding but the nodes send the messages to at most m (minimum number of links in the network) neighbors Random walk The nodes send the messages only to one of their neighbors except the source node

IEEE P2P, Aachen, Germany, September Flooding,  =0, m=3 Cutoff is the main factor defining flooding search performance.

IEEE P2P, Aachen, Germany, September Flooding:  =0.1, 0.3; m=3  =0.3, k c =10  =0.1, k c =10 Lesson: Use churn as an opportunity to restructure the network topology by carefully rewiring the peers. Churn with larger  l helps flooding performance!!

IEEE P2P, Aachen, Germany, September Normalized Flooding: m=3  j =2,  l =1  j =2,  l =0 Again, larger  l reduces the negative effect of churn!! Again, larger  l reduces the negative effect of churn. Performance of Random Walk exhibit a similar behavior to Normalized Flooding. Lesson: State information at leave is more valuable than the one at join.

IEEE P2P, Aachen, Germany, September Design Guidelines & Principles Force all peers to have a larger m (i.e., a minimum of 3) to reduce the need for large  j. Information at the time of leave is more valuable than the information at the time of join A little responsible leave results in significantly better search performance for the leftover network Rewiring is helpful – Churn can be used as an opportunity to restructure the network

IEEE P2P, Aachen, Germany, September Summary & Future Work A generic topology growth model with churn local state info hard cutoffs rewiring Scales larger than N=10,000 Models looking at dynamic behavior are worthy of pursuing..

IEEE P2P, Aachen, Germany, September Thank you! THE END Acknowledgments This work was supported by the U.S. Department of Energy under contract DE-AC52-06NA25396 and by the US National Science Foundation under awards and