Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,

Slides:



Advertisements
Similar presentations
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Advertisements

Peer-to-Peer and Social Networks Power law graphs Small world graphs.
Complex Network Theory
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) WIDS MIT, May 31, 2011.
How do the superpeer networks emerge? Niloy Ganguly, Bivas Mitra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur,
Community Detection Algorithm and Community Quality Metric Mingming Chen & Boleslaw K. Szymanski Department of Computer Science Rensselaer Polytechnic.
Achille’s Heel. An Achilles's heel is a term for a person's weak spot and is based upon the hero who was dipped in the river that granted immortality;
School of Information University of Michigan Network resilience Lecture 20.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Count / Top-k Continuous Queries on P2P Networks 01/11/2006.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
TELCOM2125: Network Science and Analysis
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
The Erdös-Rényi models
Information Networks Power Laws and Network Models Lecture 3.
Analyzing the Vulnerability of Superpeer Networks Against Churn and Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
Analyzing the Vulnerability of Superpeer Networks Against Attack B. Mitra (Dept. of CSE, IIT Kharagpur, India), F. Peruani(ZIH, Technical University of.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
Complex Network Theory – An Introduction Niloy Ganguly.
Robustness and Structure of Complex Networks Shuai Shao Boston University, Physics Department A dvisor: Prof. Gene Stanley Co-advisor: Prof. Shlomo Havlin.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Complex Network Theory – An Introduction Niloy Ganguly.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Percolation in self-similar networks PRL 106:048701, 2011
Network resilience.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Design of a Robust Search Algorithm for P2P Networks
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
Dynamics of Binary Search Trees under batch insertions and deletions with duplicates ╛ BACKGROUND The complexity of many operations on Binary Search Trees.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Marina Leri Institute of Applied Mathematical Research
Introduction Secondary Users (SUs) Primary Users (PUs)
Research Scopes in Complex Network
Robustness or Network Resilience
Department of Computer Science University of York
Network Science: A Short Introduction i3 Workshop
Peer-to-Peer Information Systems Week 6: Performance
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Peer-to-Peer and Social Networks
Deterministic and Semantically Organized Network Topology
Introducing complex networks into quantum regime
Presentation transcript:

Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur

Peer to peer and overlay network  An overlay network is built on top of physical network  Nodes are connected by virtual or logical links  Underlying physical network becomes unimportant  Interested in the complex graph structure of overlay

Dynamicity of overlay networks Peers in the p2p system leave network randomly without any central coordination Important peers are targeted for attack Makes overlay structures highly dynamic in nature Frequently it partitions the network into smaller fragments Communication between peers become impossible

Problem definition Development of an analytical framework to investigate the stability of the p2p networks against the dynamic behavior of peers Modeling of Overlay topologies pure p2p networks, superpeer networks, commercially used networks like Gnutella Peer dynamics  churn, attack p k specifies the fraction of nodes having degree k q k probability of survival of a node of degree k after the disrupting event

Stability Metric: Percolation Threshold Initially all the nodes in the network are connected Forms a single giant component Size of the giant component is the order of the network size Giant component carries the structural properties of the entire network Nodes in the network are connected and form a single giant component

Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists

Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists f c fraction of nodes removed The entire graph breaks into smaller fragments Therefore f c =1-q c becomes the percolation threshold

Development of analytical framework  Generating function:  Formal power series whose coefficients encode information Here encode information about a sequence Used to understand different properties of the graph generates probability distribution of the vertex degrees. Average degree

Development of analytical framework  Generating function:  Formal power series whose coefficients encode information Here encode information about a sequence With the help of generating function, we derive the following critical condition for the stability of giant component Degree distribution Peer dynamics

Peer Movement : Churn and attack  Degree independent node failure  Probability of removal of a node is constant & degree independent  q k =q  Deterministic attack  Nodes having high degrees are progressively removed  q k =0 when k>kmax  0< q k < 1 when k=kmax  q k =1 when k<kmax

Stability of superpeer networks against churn Superpeer networks are quite robust against churn. There is a sharp fall of fr when fraction of superpeers is less than 3%

Stability of superpeer networks against deterministic attack Two different cases may arise Case 1: Removal of a fraction of high degree nodes are sufficient to breakdown the network Case 2: Removal of all the high degree nodes are not sufficient to breakdown the network Have to remove a fraction of low degree nodes

Stability of superpeer networks against deterministic attack Two different cases may arise Case 1: Removal of a fraction of high degree nodes are sufficient to breakdown the network Case 2: Removal of all the high degree nodes are not sufficient to breakdown the network Have to remove a fraction of low degree nodes  Interesting observation in case 1  Stability decreases with increasing value of peers – counterintuitive

Conclusion Contribution of our work Development of general framework to analyze the stability of superpeer networks Modeling the dynamic behavior of the peers using degree independent failure as well as attack. Comparative study between theoretical and simulation results to show the effectiveness of our theoretical model. Future work Perform the experiments and analysis on more realistic network

Thank you