Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
Chapter 5: Tree Constructions
Peer-to-Peer and Social Networks An overview of Gnutella.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Analysis and Modeling of Social Networks Foudalis Ilias.
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Information Networks Small World Networks Lecture 5.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Niloy Ganguly Complex Networks Research Group Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Collaborators.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Small-world Overlay P2P Network
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
J. He, G. Kesidis and D.J. Miller – The Pennsylvania State University In collaboration with K. Levitt, J. Rowe, S.F. Wu – The University of California.
P2P Architecture Case Study: Gnutella Network
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Content-Based Music Information Retrieval in Wireless Ad-hoc Networks.
Niloy Ganguly (Zentrum für Hochleistungsrechnen (ZHR) – TU Dresden) Project funded by the Future and Emerging Technologies arm of the IST Programme Immune.
Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
Classification and Analysis of Distributed Event Filtering Algorithms Sven Bittner Dr. Annika Hinze University of Waikato New Zealand Presentation at CoopIS.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
A configuration method for structured P2P overlay network considering delay variations Tomoya KITANI (Shizuoka Univ. 、 Japan) Yoshitaka NAKAMURA (NAIST,
Design of a Robust Search Algorithm for P2P Networks
Reorganization in Network Regions for Optimality and Fairness Robert E. Beverly IV, MSc Thesis.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
HANGMAN OPTIMIZATION Kyle Anderson, Sean Barton and Brandyn Deffinbaugh.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
OBJECT LOCATION IN UNSTRUCTURED P2P NETWORKS USING RANDOM WALK
On Growth of Limited Scale-free Overlay Network Topologies
Niloy Ganguly, Andreas Deutsch Center for High Performance Computing
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
Coverage and Connectivity in Sensor Networks
Department of Computer Science University of York
Effective Replica Allocation
Lecture 2: Complex Networks
Presentation transcript:

Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for High Performance Computing Technical University Dresden, Germany

Apr 13, Unstructured Networks Each Network consists of peers. a c b f g d e a c b f g d e Structured Network Unstructured Network Peers host data

Apr 13, Unstructured Networks Unstructured Network Searching in unstructured networks – Non-deterministic Algorithms Flooding, random walk Our algorithms – packet proliferation and mutation a c b f g d e ? 6!!!

Apr 13, Unstructured Networks Unstructured Network Searching in unstructured networks – Non-deterministic Algorithms Flooding, random walk Our algorithms – packet proliferation and mutation a c b f g d e

Apr 13, Model Definition Topology Data and query distribution Algorithms Metrics

Apr 13, Topology Definition Random Graph No of Nodes = 10000, Mean Indegree ≈ 4 Power-law graph No of Nodes = 10000, Mean Indegree ≈ 4 Random Topology – BRITE Power-law graph - INET No of nodes # link No of nodes # link

Apr 13, Query/Data Distribution Query/Data – 10 bit strings – 1024 unique queries/data (tokens) – Distributed based on Zipf’s Law power law - frequency of occurrence of a token T α 1/r, rank of the token

Apr 13, Algorithms Query Initiation Algorithm – Start a search by flooding k query message packets to the neighborhood Query Processing Algorithm – Compare query message with data. Report a match if message = data. Query Forwarding Algorithm – Forward the message to the neighbors

Apr 13, Forwarding Algorithms Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Restricted Proliferation/Mutation Algorithm (RPM) Random Walk Algorithms Simple Random Walk Algorithm (RW) Restricted Random Walk Algorithm (RRW) High Degree Restricted Random Walk Algorithm ( HDRRW )

Apr 13, Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighboring nodes a c b f g d e N = 3

Apr 13, Proliferation/Mutation Algorithms Restricted Proliferation/Mutation Algorithm (RPM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighboring nodes if free a c b f g d e N = 3

Apr 13, Proliferation Controlling Function Production of N messages depends on a. Proliferation constant (ρ) b. Hamming distance between message and data c. Always ≥ 1 and ≤ no of neighbors ab Number of packets Probability Number of packets Probability

Apr 13, Random Walk Algorithms Simple Random Walk Algorithm (RW) Forward the message to a randomly selected neighbor a c b f g d e

Apr 13, Random Walk Algorithms Restricted Random Walk Algorithm (RRW) Forward the message to a randomly selected free neighbor a c b f g d e

Apr 13, Random Walk Algorithms High Degree Restricted Random Walk Algorithm (HDRRW) Forward the message to the free neighbor which has highest number of neighbors a c b f g d e

Apr 13, Metrics 1.Search efficiency No of search items found within 50 time steps from initiation of search 2.Network coverage efficiency No of time steps required to cover the entire network 3.Cost per item No of message packets needed to search one item Time Step - A time step is the period within which all the nodes operate once in a random sequence

Apr 13, Experiments Experiment Coverage – Calculate time taken to cover the entire network after initiation of a search from a randomly selected initial node. Repeated for 500 such searches. Experiment TimeStep- Calculate the number of search items found after 50 time steps from initiation of a search. Average the result over 100 searches (a generation).

Apr 13, Fairness Criteria Comparing a random walk algorithm with a proliferation algorithm (RW and PM) Both processes work with same average number of packets. Comparing between two proliferation/mutation algorithm (PM and RPM) Both processes have same proliferation constant and same number of message packets initially

Apr 13, Experimental Results Experiment Coverage Comparison Between PM/RPM and RW/RRW Comparison Between RPM and RRW on Different Topologies Effect of mutation on power-law network Experiment TimeStep Search Efficiency and Cost Regulation

Apr 13, Experimental Result -1 Comparison Between PM/RPM and RW/RRW Results on grid Experiment Coverage with ρ = 3 Network coverage time RW > RRW > PM > RPM

Apr 13, Experimental Result -1 Comparison Between PM/RPM and RW/RRW Results on grid Experiment Coverage with ρ = 3 Network coverage time RW > RRW > PM > RPM Cost PM 10 times more than RPM

Apr 13, Comparison Between RPM and RRW on Different Topologies Experimental Result -2 Experiment Coverage Network coverage time RRW > RPM Network coverage time power- law Network > random network HDRRW is better than RRW, however only slightly

Apr 13, Search Efficiency and Cost Regulation Experimental Result -3 Experiment TimeStep on random network Spanning over 100 generations Search efficiency of RPM is 2.5 times better than RRW

Apr 13, Search Efficiency and Cost Regulation Experimental Result -3 Experiment TimeStep on random network Spanning over 100 generations Excellent cost regulation, number of messages required by RPM is virtually constant in spite of varying search output

Apr 13, Effect of mutation on power-law network Experimental Result -4 Experiment Coverage on power- law network RPM β = 0.1 and ρ = 3 works best, better than even ρ = 3.5 Cost of RPM (β = 0.1 and ρ = 3) and (ρ = 3.5) is same Combination of proli/mutation has better effect than proliferation However, higher mutation doesn’t improve the efficiency

Apr 13, Experiment Coverage on grid Different grid shapes – 100 x 100, 200 x 50, 400 x 25, 500 x 20, 1000 x 10 RPM coverage time increases from 198 to 951 ( ≈ 5 times) RRW coverage time increases from 1105 to ( ≈ 30 times) Scalability –Scalability with respect to shape Experimental Result -5

Apr 13, Experiment coverage on grid Different Grid sizes – 100 x 100, 300 x 300, 500 x 500 The increase in network coverage time RPM < log (increase of number of nodes) [198 → 586] RRW ≈ increase of number of nodes [1105 → 16161] Scalability –Scalability with respect to size Experimental Result -5

Apr 13, Summary Restricted proliferation/mutation (random walk) is better than simple proliferation/mutation (random walk). Both network coverage and search output is much better in restricted proliferation/mutation than restricted random walk Proliferation has special cost regulatory function inbuilt Mutation helps in enhancing coverage in power-law network, but it should be properly regulated The proliferation/mutation scheme is extremely scalable

Apr 13, Thank you

Apr 13, Experiment TimeStep on grid Different grid sizes – 100 x 100, 300 x 300, 500 x 500 Both for RPM and RRW, the search output remains constant Scalability – Scalability with respect to size Experimental Result -5

Apr 13, Experimental Result -1 Results on grid Experiment Coverage with ρ = 3 Network coverage time RW > RRW > PM > RPM Comparison Between PM/RPM and RW/RRW

Apr 13, Results on grid Experiment Coverage with ρ = 3 Network coverage time RW > RRW > PM > RPM Cost PM 10 times more than RPM Experimental Result -1 Comparison Between PM/RPM and RW/RRW

Apr 13, Experiment Coverage Network coverage time RRW > RPM Network coverage time power- law Network > grid > random network HDRRW is better than RRW, however only slightly Comparison Between RPM and RRW on Different Topologies Experimental Result -2

Apr 13, Experiment TimeStep on random network Spanning over 100 generations Search efficiency of RPM is 2.5 times better than RRW Search Efficiency and Cost Regulation Experimental Result -3

Apr 13, Experiment TimeStep on random network Spanning over 100 generations Excellent cost regulation, number of messages required by RPM is virtually constant in spite of varying search output Search Efficiency and Cost Regulation Experimental Result -3

Apr 13, Experiment Coverage on power-law network RPM β = 0.1 and ρ = 3 works best, better than even ρ = 3.5 However, higher mutation doesn’t improve the efficiency Effect of mutation on power-law network Experimental Result -4

Apr 13, Experiment Coverage on power-law network RPM β = 0.1 and ρ = 3 works best, better than even ρ = 3.5 Cost of RPM (β = 0.1 and ρ = 3) and ( ρ = 3.5) is same Combination of proli/mutation has better effect than proliferation Effect of mutation on power-law network Experimental Result -4

Apr 13, Experiment Coverage on grid Different grid shapes – 100 x 100, 200 x 50, 400 x 25, 500 x 20, 1000 x 10 RPM coverage time increases from 198 to 951 ( ≈ 5 times) RRW coverage time increases from 1105 to ( ≈ 30 times) Scalability –Scalability with respect to shape Experimental Result -5

Apr 13, Experiment coverage on grid Different Grid sizes – 100 x 100, 300 x 300, 500 x 500 The increase in network coverage time RPM < log (increase of number of nodes) [198 → 586] RRW ≈ increase of number of nodes [1105 → 16161] Scalability –Scalability with respect to size Experimental Result -5