1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Advertisements

Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Computing Classic Closeness Centrality, at Scale Edith Cohen Joint with: Thomas Pajor, Daniel Delling, Renato Werneck Microsoft Research.
Analysis and Modeling of Social Networks Foudalis Ilias.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
Hierarchy in networks Peter Náther, Mária Markošová, Boris Rudolf Vyjde : Physica A, dec
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
A Real-life Application of Barabasi’s Scale-Free Power-Law Presentation for ENGS 112 Doug Madory Wed, 1 JUN 05 Fri, 27 MAY 05.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
More routing protocols Alec Woo June 18 th, 2002.
 We developed a fast and tunable crawler, Cruiser.  Cruiser uses a master-slave architecture, parallel crawling, and leverages the two-tier topology.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Presented by Ozgur D. Sahin. Outline Introduction Neighborhood Functions ANF Algorithm Modifications Experimental Results Data Mining using ANF Conclusions.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Computer Science 1 Web as a graph Anna Karpovsky.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
CS8803-NS Network Science Fall 2013
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Random Graph Models of Social Networks Paper Authors: M.E. Newman, D.J. Watts, S.H. Strogatz Presentation presented by Jessie Riposo.
Information Networks Power Laws and Network Models Lecture 3.
Virtual Communities and Gossiping in Social-Based P2P Systems
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Trustworthiness Management in the Social Internet of Things
From Torrent to Magnet Link Presenter: Guanlong Zhou Fan Feng a new way of sharing on P2P network TRIBLER: A social-based Peer-to-Peer system.
Social Network Analysis (1) LING 575 Fei Xia 01/04/2011.
1 Nasser Alsaedi. The ultimate goal for any computer system design are reliable execution of task and on time delivery of service. To increase system.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Computing Classic Closeness Centrality, at Scale Edith Cohen Joint with: Thomas Pajor, Daniel Delling, Renato Werneck.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
March 3, 2009 Network Analysis Valerie Cardenas Nicolson Assistant Adjunct Professor Department of Radiology and Biomedical Imaging.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Data Mining CH6 Implementation: Real machine learning schemes(2) Reporter: H.C. Tsai.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Prediction of Interconnect Net-Degree Distribution Based on Rent’s Rule Tao Wan and Malgorzata Chrzanowska- Jeske Department of Electrical and Computer.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Public and private BitTorrent communities: A measurement study M. Meulpolder, L. D’Acunto, M. Capotă, M. Wojciechowski, J.A. Pouwelse, D.H.J. Epema, H.J.
Applications of graph theory in complex systems research
Minimum Spanning Tree 8/7/2018 4:26 AM
(Parallel and) Distributed Systems Group
Network Science: A Short Introduction i3 Workshop
Department of Computer Science University of York
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Pramod Bhatotia, Ruichuan Chen, Myungjin Lee
Korea University of Technology and Education
Presentation transcript:

1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations for an Internet Deployed P2P Reputation System Dimitra Gkorou, Johan Pouwelse, and Dick Epema

2 HOTP2P 2011 Overview Tribler The Bartercast Reputation Mechanism Betweenness Centrality Approximations for Betweenness Centrality Integration of these methods in Bartercast Conclusion

3 HOTP2P 2011 Tribler: main features based on the BitTorrent P2P file-sharing system an epidemic protocol for peer and content discovery social phenomena to implement distributed control: content discovery content recommendation reputation system first released on 17 March 2006 more than 1,000,000 downloads BarterCast: the reputation system of Tribler against free- riders J.A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D.H.J. Epema, M. Reinders, M.R. van Steen, H.J. Sips, "Tribler: A social-based peer-to-peer system," Concurrency and Computation: Practice and Experience Vol. 20, , 2008.

4 HOTP2P 2011 BarterCast 1: Basic Concepts i nformation exchange: using an epidemic protocol peers keep the history of their own interactions + the interactions among other peers each peer i creates a directed, weighted local graph: vertices:the peers whose activity is known to peer i weighted edges:the amount of the transferred data between two peers each peer computes locally the subjective reputations of other peers in the system k w kb b w im m w ij w jc j w ki c i local subjective graph of peer i

5 HOTP2P 2011 Bartercast 2: Information Exchange Bartercast local subjective graph of peer 9 local subjective graph of peer w 9,8 8 w 6,9 6 w 9, w 10,12 w 2,12 2 w 9,10 w 10,4 w 9,8 8 w 6,9 6 data transactions 8 6 M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips, "BarterCast: A Practical Approach to Prevent Lazy Freeriding in P2P Networks," (HoT-P2P), in conjunction with IPDPS, May 2009.

6 HOTP2P 2011 Bartercast 3: Computing Reputation a peer i willing to interact with a peer g: considers the amount of transferred data in its local subjective graph as flows use of the max-flow algorithm to compute f gi and f ig reputation of peer g: the difference of f gi and f ig the computation is restricted to paths of length 2 due to its computational cost j e local subjective graph of peer i c i b W ca\ac w bi w ia a f w gk k w bj g w jg w fg w ge W ba\ab w gc

7 HOTP2P 2011 Bartercast 4: Problem Description starting the computation from the owner of the subjective graph itself results in bad coverage starting from the most central node results in better coverage the most central node is the node with the highest betweenness centrality (BC) local subjective graph of peer i e j c i b W ca\ac w bi w ia a f w gk k w bj g w jg w fg w ge W ba\ab w ga

8 HOTP2P 2011 Betweenness Centrality The BC of a node  is the sum of the ratios of shortest paths between pairs of nodes passing through node  : computation of BC: the all-pair shortest path problem the fastest algorithm for BC: explores and counts the shortest paths using Breadth-First Search starting from every node in the network aggregates efficiently the path counts # shortest paths between nodes s,t passing through node  # shortest paths between nodes s,t

9 HOTP2P 2011 Experimental Setup 1: Dataset growing synthetic and Bartercast graphs the synthetic graphs grow from 1,000 up to 20,000 nodes 20 instances, each one containing the previous one + 1,000 new nodes for the BarterCast graph: we crawled BarterCast from 24 July to 9 September 2009 it starts with 1,592 nodes and reaches up to 2,408 nodes

10 HOTP2P 2011 Experimental Setup 2: Graph Types random graph each new node is connected to every existent node with a constant probability P power-law graph each new node is preferentially attached to existent nodes with a probability proportional to their degree. its degree distribution is expressed as P(k)  ck -  only a few nodes are highly connected graph derived from Bartercast power-law exponent :  2.2 power-law exponent

11 HOTP2P 2011 Approximation 1: Growing Graphs the most central node in real graphs does not change often due to their structural properties and so, we don’t have to update BC values often. focus on the stability of the top-n most central nodes consider the sequences of IDs of the top-n most central nodes in consecutive graph instances we use two metrics: the number of common nodes in two consecutive sequences the minimal number of transpositions needed to get all the common nodes of latter sequence in the order of the previous

12 HOTP2P 2011 Approximation 1: Growing Graphs Random Graph Power-law Graph Number of common nodes Instance number (t) Number of common nodes Instance number (t) Number of transpositions Instance number (t) In power-law graphs, the most central nodes remain almost invariant in time and so, BC has not to be recomputed often

13 HOTP2P 2011 Approximation 2: Large Graphs 1.Pivot BC (P-BC): random selection of a small subset of nodes (the pivots) to start Breadth-First Search Overestimation of the BC of nodes close to pivots 2.Scale BC (S-BC): like P-BC but normalized over the distance of a node from the pivots 3.k-BC: exploring the paths of length at most equal to k k=2

14 HOTP2P 2011 Approximation 2: Large Graphs Random Graph Power-Law Graph Cost of computation Number of correctly identified nodes Cost of computation Number of correctly identified nodes Cost of computation Number of transpositions Cost of computation Number of transpositions In power-law graphs, the approximations of BC are highly accurate (S-BC achieves the best accuracy) In random graphs, all the approximations have a lower accuracy (k-BC achieves the best accuracy)

15 HOTP2P 2011 Approximation 2: Large Graphs BarterCast Graph Number of correctly identified nodes Cost of computation Number of transpositions In BarterCast graphs, the approximations are accurate enough, with S-BC achieving the best results

16 HOTP2P 2011 Integration in BarterCast 1: Setup we integrate P-BC, S-BC and k-BC in BarterCast evaluating their effect each peer identifies the most central node in its subjective graph using one of these approximations and then applies max-flow with that node as a start point two metrics coverage: the fraction of peers in a subjective graph for which the local reputations turn out to be non-zero relative average error: the absolute difference of the locally computed reputations of the peers and their actual reputations

17 HOTP2P 2011 Integration in BarterCast 2: Results BC=0: a node with BC equal to 0 1/2maxBC: the node with BC equal to 50% of the maximum BC maxBC: the node with the maximum BC Coverage Relative Average Error Using the most central node in the computation of reputation results in better coverage and smaller average error S-BC and k-BC identify the most central node correctly

18 HOTP2P 2011 Conclusions & Future Work power-law graphs: the approximation of BC are efficient and highly accurate random graphs: it is harder to identify the most central nodes using the node with the highest BC increases the accuracy and the coverage in Bartercast k-BC and S-BC identify correctly the most central node in Bartercast future work: not keeping the complete history of transferred data for the computation of reputation limited size of memory computational cost accuracy

19 HOTP2P 2011 Questions? contact: