Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.

Slides:



Advertisements
Similar presentations
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Playback delay in p2p streaming systems with random packet forwarding Viktoria Fodor and Ilias Chatzidrossos Laboratory for Communication Networks School.
The Role of Prices in Peer-Assisted Content Distribution Christina Aperijis Michael J. Freedman Ramesh Johari Presented by: Kyle Chauvin and Henry Xie.
Modelling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks.
1 Complexity of Network Synchronization Raeda Naamnieh.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Motivation Due to the development of new Internet access technologies (DSL's and HFC's), VoD services have become increasingly popular Despite the continuous.
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Modeling and analysis of BitTorrent-like P2P network Fan Bin Oct,1 st,2004.
Distributed Process Management
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Random Early Detection Gateways for Congestion Avoidance
Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein.
A Multi-Agent Learning Approach to Online Distributed Resource Allocation Chongjie Zhang Victor Lesser Prashant Shenoy Computer Science Department University.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Exploring VoD in P2P Swarming Systems By Siddhartha Annapureddy, Saikat Guha, Christos Gkantsidis, Dinan Gunawardena, Pablo Rodriguez Presented by Svetlana.
Christina Aperjis, Michael J. Freedman and Ramesh Johari Presented By Vidya Nalan Chakravarthy.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Load Balancing and Termination Detection Load balance : - statically before the execution of any processes - dynamic during the execution of the processes.
Chapter 15 Money supply Process.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
The EigenTrust Algorithm for Reputation Management in P2P Networks
GridIS: an Incentive-based Grid Scheduling Lijuan Xiao, Yanmin Zhu, Lionel M. Ni, Zhiwei Xu 19th International Parallel and Distributed Processing Symposium.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
The Application of The Improved Hybrid Ant Colony Algorithm in Vehicle Routing Optimization Problem International Conference on Future Computer and Communication,
Cell Zooming for Cost-Efficient Green Cellular Networks
Downlink Scheduling With Economic Considerations to Future Wireless Networks Bader Al-Manthari, Nidal Nasser, and Hossam Hassanein IEEE Transactions on.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Daniel A. G. Manzato and Nelson L. S. da Fonseca Institute of Computing, State University of Campinas Campinas, Brazil speaker: 吳麟佑.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Peer-to-Peer Video Systems: Storage Management CS587x Lecture Department of Computer Science Iowa State University.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
P2P Storage/Bandwidth Sharing: Fairness and Security.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Expediting Peer-to-Peer Simulation using GPU Di Niu, Zhengjun Feng Apr. 14 th, 2009.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
A Scalable Routing Architecture for Prefix Tries
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Lecture XVII: Distributed Systems Algorithms Inspired by Biology
Peer-to-Peer Video Services
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
Presentation transcript:

Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked Asynchronous Bilateral Trading (NABT)

Outline  General introduction of Global currency, Bartering and NABT  NABT model Basic concepts of NABT Modeling of NABT Credit transfer routing in NABT  Simulation analysis Credit limit setting Simulation setup Simulation results

General introduction of Global currency, Bartering and NABT  Global currency ( 货币 ) An efficient incentive mimics real-world currency and transactions Disadvantage:  Requires high degree of coordination: central bank rely on a well-functioning legal system that enforces contracts and resolves disputes  Need to built reputation against inflation ( 通胀 )

General introduction of Global currency, Bartering and NABT  Bartering( 以货易货 ) Peers bilaterally and synchronously trade resources. Advantage: simplicity, no need for currency, banks, dispute-resolution mechanisms or bank regulation. Disadvantage: synchronous; difficult to trade long-tail contents between peers.

General introduction of Global currency, Bartering and NABT  NABT: Peers belong to a social network, with each peer having a set of friends. Each pair of friends maintains a credit balance and a credit limit.  Advantage: Asynchronism over time and over nodes. Provide service differentiation, exploit trading intermediaries, discourage free-riders.

Basic concepts of NABT  Social network: each peer has a set of friends. Each peer has certain resources.  Credit limits: Each peer i sets a credit limit Cij for each friend j. Cij quantifies the trust between i and j and depends on their past trading history.

Basic concepts of NABT  Credit balance: bij denotes the amount of credits user j owes user i. bij = -bji and – Cji <= bij <= Cij.  Asynchronous trading: i charges j a certain amount of credits. i ’ s credit balance with j increases correspondingly. Service stops if j ’ s resulting debt bij exceeds the credit limit Cij.

Basic concepts of NABT  Trading via intermediaries: peers can use their mutual friends as a credit intermediary to get service.

Modeling of NABT  Gs = (U, F) U: users connected in social network. F: friends relations between users.

Modeling of NABT  G D = (U, D) D: service demand profile among users. For a service demand d = (k, l) ∈ D, k is the provider and l is the consumer. K charge l a cost of h(k, l)for providing the service.

Modeling of NABT  H = [H(k, l)] H is a |U|×|U| demand matrix as H(k, l) = h(k, l) if (k, l) ∈ D, otherwise H(k, l) = 0.  Initially, bij(0) = bji(0) = 0. after i serves j once, balance becomes bij(1) = h(i, j). Then j serves i, balance becomes bij(2) = h(i, j) – h(j, i). – Cji <= bij <= Cij, else i can ’ t get service from j.

Modeling of NABT  Specifically, if l wants to obtain service from k, l first tries to find a path from k to l, p(k,l) = {k = r 0 - >r 1 -> … ->r m = l}. L then transfer credit h(k,l) in the reverse direction: r n pays h(k,l) to r n-1. after transfers, the credit balance on each node is updated.

Credit transfer routing in NABT  Xd : the amount of credit j take form i for service demand d.

Credit transfer routing in NABT  The resulted credit balance between user I and j after all credit transers is bij = ∑ d ∈ D (Xd - Xd ).  So, we have to make sure the resulted credit balances on all links after executing all demands satisfy: -Cji - Xd ) <= Cij.

Simulation analysis  Trading with global currency (GCT): If peer i wants to download from peer j, i pays credit directly to j.  Synchronous trading (ST): Two peers can trade if and only if they can supply files to each other simultaneously.  Two-hop NABT The peer checks whether there are potential supplying peers within the two hops, and whether the paths to these supplying peers can pass sufficient pair wise credits.

Credit limit setting  Additive Increase Multiplication Decrease (AIMD) algorithm: the credit limit on a social link increases by an amount of α after each fulfilled transaction utilizing the link; the credit limit decreases by a factor of β whenever the link is involved in an unfulfilled or disputed transaction. To avoid credit limit explosion, maximum credit limit can also be set.

Simulation setup  Assume file popularity follows a Zipf distribution with the parameter ρ = 0.27; 37% peers with upload bandwidth of 1.2M, 63% of 400K; 10% with 1000 files to share, the others with 50; Each peer generates file download requests by Poisson process every 10 minutes on average.  Request can ’ t be scheduled in 60 minutes would be drop. Each peer can at most manage 100 unscheduled requests. if reaches 100, any newly generated requests will be simply blocked.

Simulation setup  Supplier maintains a serve queue and services requests in FIFO fashion.  If more than one supplier found, select a supplier can serve request with the shortest waiting time.

Simulation results  Request success ratio and waiting time

Simulation results  ST: Lack of common interest in the ST system limits the chance of trading and cause low success ratio and long time to find a trading partner with mutual interest.  GCT: Peers with less credit or low serving capacity result in low success ratio.  NABT: peers not well connected spend more time before their requests be scheduled.

Simulation results  Contribution and relay time vs requests success ratio

Simulation results  Requests success ratio vs Hops and cooperation attitude