The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

1 Analyzing Kleinberg’s Small-world Model Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Scalable Content-Addressable Network Lintao Liu
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Online Social Networks and Media Navigation in a small world.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Information Networks Small World Networks Lecture 5.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Searching in Unstructured Networks Joining Theory with P-P2P.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Small-world networks. What is it? Everyone talks about the small world phenomenon, but truly what is it? There are three landmark papers: Stanley Milgram.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Void Traversal for Guaranteed Delivery in Geometric Routing
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
SCHOOL OF ENGINEERING AND ADVANCED TECHNOLOGY Engineering Project Routing in Small-World Networks.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Pastry Scalable, decentralized object locations and routing for large p2p systems.
A Scalable Peer-to-peer Lookup Service for Internet Applications
Peer-to-Peer and Social Networks
DHT Routing Geometries and Chord
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Navigation and Propagation in Networks
Presentation transcript:

The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)

 We have long been interested in decentralized “Peer to Peer” networks.  But when individual users come under attack, decentralization is not enough.  Future networks may need to limit connections to trusted friends.  The big question is: Can such networks be useful?

 Information is spread across many interconnected computers  Users want to find information  Some are centralised (eg. Napster), some are semi- centralised (eg. Kazaa), others are distributed (eg. Freenet)

 Peers only communicate directly with “trusted” peers  Examples: Waste  Advantage: Only your trusted friends know you are part of the network  Disadvantage: Networks are disconnected and small, they typically don't scale well

 In "Small world" networks short paths exist between any two peers  People tend to form this type of network (as shown by Milgram experiment)  Short paths may exist but they may not be easy to find

 Concept of similarity or “closeness” between peers  Similar peers are more likely to be connected than dissimilar peers  You can get from any one peer to any other simply by routing to the closest peer at each step  This is called “Greedy Routing”  Freenet and “Distributed Hash Tables” rely on this principal to find data in a scalable decentralized manner

How can we apply small world theory to routing in a Dark peer to peer network?  A Darknet is, essentially, a social network of peoples trusted relationships.  If people can route in a social network, then it should be possible for computers.  Jon Kleinberg explained in 2000 how small world networks can be navigable.

 The possibility of routing efficiently depends on the proportion of connections that have different lengths with respect to the “position” of the nodes.  If the positions are in a ring, the proportion of connections with a certain length should be inverse to the length  In this case a simple greedy routing algorithm performs in O(log2 n) steps.  But in a social network, how do we see if one person is closer to the destination than another?

Is Alice closer to Harry than Bob?  In real life, people presumably use a large number of factors to decide this. Where do they live? What are their jobs? What are their interests?  One cannot, in practice, expect a computer to route based on such things.  Instead, we let the network tell us!

 Kleinberg’s model suggests: there should be few long connections, and many short ones.  We can assign numerical identities placing nodes in a circle, and do it in such a way that this is fulfilled.  Then greedy route with respect to these numerical identities.

 When nodes join the network, they choose a position on the circle randomly.  They then switch positions with other nodes, so as to minimize the product of the edge distances.

 Two nodes are chosen in some random fashion, and attempt to switch.  They calculate l b as the product of all the lengths of their current connections. Then they calculate l a as the product of what all their respective connection lengths would be after they switched.  If l b > l a they switch. Otherwise they switch with probability l b /l a.

 Because there is a greater chance of moving to positions with shorter connection distances, it will tend to minimize the product of the distances.  Because the probability of making a switch is never zero, it cannot get stuck in a bad configuration (a local minima).

 How do nodes choose each other to attempt to switch?  Any method will work in theory, but some will work better than others. Only switching with neighbors does not seem to work in practice.  Our current method is to do a short random walk starting at one of the nodes and terminating at the other.

 They have simulated networks in three different modes: ◦ Random walk search: “random”. ◦ Greedy routing in Kleinberg's model with identities as when it was constructed: “good”. ◦ Greedy routing in Kleinberg's model with identities assigned according to our algorithm (2000 iterations per node): ”restored”.

 The proportion of queries that succeeded within (log2 n)2 steps, where n is the network size:

 The average length of the successful routes:

 So the theory works, but how does one implement such a network in practice?  Key concerns: ◦ Preventing malicious behavior ◦ Ensuring ease of use