Cuckoo: Towards Decentralized, Socio-Aware Online Microblogging Services and Data Measurements Tianyin Xu Yang Chen Nanjing University, University of Goettingen.

Slides:



Advertisements
Similar presentations
Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Xiaoming Fu Computer Networks Group, Institute of Computer Science University of Göttingen,
Advertisements

Scaling Microblogging Services with Divergent Traffic Demands Presented by Tianyin Xu Tianyin Xu, Yang Chen, Lei Jiao, Ben Zhao, Pan Hui, Xiaoming Fu University.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Peer to Peer and Distributed Hash Tables
Promoting Your Business Through Twitter ©2009, All rights reserved Fox Coaching Associates.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Twittering by Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Tianyin Xu Yang Chen Nanjing University, University of Goettingen University.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Outline for today Structured overlay as infrastructures Survey of design solutions Analysis of designs.
Small-world Overlay P2P Network
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification D. Sandler, A. Mislove, A. Post, P. Druschel Presented by: Andrew Sutton.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Wide-area cooperative storage with CFS
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
. Outline 1.About LinkedIn 2.Personal Profile 3.Make Connections 4.Communicate 5.Groups 6.Pages 7.Events 8.Answers 9.Applications 10.Direct Ads.
P2P File Sharing Systems
+ The Future of Social Media By Abigail Boghurst.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
1 Speaker : 童耀民 MA1G Authors: Ze Li Dept. of Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA Haiying Shen ; Hailang Wang ; Guoxin.
Communication (II) Chapter 4
C HAPTER Social Networking Using Twitter 7 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
TWITTER What is Twitter, a Social Network or a News Media? Haewoon Kwak Changhyun Lee Hosung Park Sue Moon Department of Computer Science, KAIST, Korea.
Microblogs: Information and Social Network Huang Yuxin.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Presented by: Sanketh Beerabbi University of Central Florida.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Social Media Primer. Social Media is Great For: Building awareness and attracting new business Fostering community Providing helpful content and information.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
We.b : The web of short URLs Demetris Antoniades, lasonas Polakis, Gerogios Kontaxis, Elias Athansapoulos, Sotiris loannidis, Evangelos P.Markatos, Thomas.
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
FeedTree: Sharing Web micronews with peer-to-peer event notification Dan Sandler, Alan Mislove, Ansley Post, Peter Druschel Presented by: Anupama Atmakur.
5th Edition, Irv Englander
An example of peer-to-peer application
CHAPTER 3 Architectures for Distributed Systems
Early Measurements of a Cluster-based Architecture for P2P Systems
5.2 FLAT NAMING.
Presentation transcript:

Cuckoo: Towards Decentralized, Socio-Aware Online Microblogging Services and Data Measurements Tianyin Xu Yang Chen Nanjing University, University of Goettingen University of Goettingen Jin Zhao Xiaoming Fu Fudan University University of Goettingen Presenter: Florian Tegeler University of Goettingen

Outline  Background  Current Problems and Limitations  Key Design Issues of Cuckoo  Future Work 2

Take Twitter as an example: 1.Less than 4 years (launched in October 2009) 2.More than 41 million users as of July 2009; - userbase is still growing exponentially 3. Over 50 million microblogs posted per day Online microblogging services have become tremendously popular in these years!! Twitter Yammer Plurk Google Buzz Squeelr identi.ca jaiku emote.in Chinese sina microblogging

Microblogging’s Sole Functions Publish a microblog Publish a short message (usually < 140 characters) Follow 1. Being a follower means the user receive all the messages from those he follows; 2. A user can follow any other user, and the user being followed need not follow back; No reciprocation, different from Facebook/LinkedIn/…! ACB B follows A and C follows B A´s microblogs are visible to B and B´s microblogs are to C

CDF of Twitter Followers* *D. R. Sandler et al., Bird of a FETHR: Open, decentralized micropublishing, IPTPS-2009.

There are a few highly- subscribed(followed) celebrities. Twitter serves more as an information spreading medium than an online social network service*. *H. Kwak et al., What is Twitter, a Social Network or a News Media? WWW-2010.

User Classification according to their social relationships* Broadcasters / Celebrities / Influentials Have huge amount of followers News media & celebrities Acquaintances Tend to exhibit reciprocity in their relationships Miscreants / Evangelists Try to contact everyone and hope that someone can follow back Spammers or stalkers *B. Krishnamurthy et al., A Few Chirps About Twitter, WOSN-2008.

Outline  Background  Current Problems and Limitations  Key Design Issues of Cuckoo  Future Work 8

Current microblogging systems are based on centralized architectures! Performance Bottleneck “Over capacity error” - 3% of page requests in June 2008* “Database maintenance error” *E. Williams, Measurable improvements, July 2008,

Current microblogging systems are based on centralized architectures! (cont.) Current Solution Rate limiting - Only allows clients to make a limited number of calls in a given hour. - Twitter: 150 requests per hour, 2,000 requests for whitelist TinyURL - Replaces URLs of a certain length with TinyURL contractions Upper limit on the number of people a user could follow - Orkut: 1000, Flickr: 3000, Facebook: 5000, - Twitter: 2000 before 2009, now using a more sophisticated strategy* *The Effects of Restrictions on Number of Connections in OSNs: A Case-Study on Twitter, WOSN-2010.

Current microblogging systems are based on centralized architectures! (cont.) Security - Vulnerable to malicious attacks and service blocking 1. Twitter & Facebook did be a victim of DDoS attack* 2. Twitter is still blocked by some governments - Hard to recovery from central server failure 1. Facebook database outrage cut off about 150,000 users§ * Twitter, Facebook attack targeted one user, l §Facebook database outrage cut off about 15,000,

Current microblogging systems are based on centralized architectures! (cont.) Data Collection - Based on data crawling on centralized server 1. traffic storm 2. not scalable - Fail to retrieve statistics from departed users

We need a peer-assisted scheme for microblogging!

Outline  Background  Current Problems and Limitations  Design Rationale of Cuckoo  Future Work 14

System Architecture: Peer-Assisted rather than Fully Distributed Fully compatible with current Twitter arch. Push is more efficient than Pull - But… Twitter server (API) only support the “pull” - So gossip push among peers, pull between peers and server Use DHT (Pastry) as underlying infrastructure - support lookup service - improve availability Do not exclude service providers from the picture

Hybrid Overlay Networks: structured (DHT) + unstructured (Gossip) DHT-based overlay: lookup service + improve availability Gossip-based overlay: micro-news dissemination Gay Ergun Florian Dave Clark Bob Alice Henry

Take advantage of social relationships Using the 4 social relationships Using the 4 social relationships: FriendFriend - Friend is a reciprocate social link between two users - Friends are acquaint with each other and willing to help each other Neighbor - Users sharing common interests - For example, two user sharing a same followee are neighbors - Neighbors assists the bootstrap & micro-content propagation Followee / Following - Most common one-way connections

4 kinds of social relationships Friends - virtual node Neighbors - assisted gossip dissemination - assists bootstrap Followee / Follower - direct sending Gay Alice Henry Dave Clark Bob Florian Ergun

Socio-Aware Updating -- using DHT-based overlay Example: Alice wakes up, updates the latest status of Ergun.  Both of Alice and Clark follows Ergun (they’re neighbors) => Alice gets the statuses of Ergun directly from Clark. Pros  Shorten the DHT routing path;  Distribute the traffic of the popular host into its followers. Alice Bob Clark Dave Ergun Florian Henry Gay Different kinds of Message Types 1. ReqFollow/RplFollow: address indexing 2. ReqStatus/RplStatus: content indexing

Micro-Content Propagation -- using Gossip-based distribution Normal Users  Directly pushing messages;  90% users have less than 100 followers. Broadcasters  Gossip-based push between neighbors. Florian Gay Henry Alice Bob Clark Dave Ergun

Functionalities of Service Providers Work as backup servers  Guarantee availability e.g., unpopular nodes are seldom online nor its friends;  Still keep the invaluable user community & user information. Our Objective  Help the service provides, but not to bury them!

Incentives for Service Providers and End Users For Service Providers Low Bandwidth CostLow Bandwidth Cost High scalability High security Will not lose any functionality nor user community For End Users High reliabilityHigh reliability - store locally, easy to recovery - store locally, easy to recovery Better Quality of ExperienceBetter Quality of Experience - low response latency, high searching efficiency, less service unavailability - low response latency, high searching efficiency, less service unavailability Enrichment of Additional Functions - Third-party developers can implement new functions (not supported by service providers) based on the underlying overlay network

Outline  Background  Current Problems and Limitations  Design Rationale of Cuckoo  Future Work 23

Future Work 1. Support “topic trend” functions Currently, a quite common use for microblogging is looking at particular topics - e.g., UK general election 2. Supporting user mobility 3. Group Communication Can we build a group communication (multicast)? - Should based on gossip protocol; - Like FeedTree on Scribe on Pastry; 4. Add some functions on the server side

Thanks!