Twittering by Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Tianyin Xu Yang Chen Nanjing University, University of Goettingen University.

Slides:



Advertisements
Similar presentations
Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Xiaoming Fu Computer Networks Group, Institute of Computer Science University of Göttingen,
Advertisements

Scaling Microblogging Services with Divergent Traffic Demands Presented by Tianyin Xu Tianyin Xu, Yang Chen, Lei Jiao, Ben Zhao, Pan Hui, Xiaoming Fu University.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Promoting Your Business Through Twitter ©2009, All rights reserved Fox Coaching Associates.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
TDTS21: Advanced Networking Lecture 8: Online Social Networks Based on slides from P. Gill Revised 2015 by N. Carlsson.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification D. Sandler, A. Mislove, A. Post, P. Druschel Presented by: Andrew Sutton.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Wide-area cooperative storage with CFS
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
Group #11 SOCIAL NETWORKING. a website where one connects with those sharing personal or professional interests, place of origin, education at a particular.
Adriana Iordan Web Marketing Manager / Avangate Social Networking Media How the software authors should use it?
. Outline 1.About LinkedIn 2.Personal Profile 3.Make Connections 4.Communicate 5.Groups 6.Pages 7.Events 8.Answers 9.Applications 10.Direct Ads.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
SOCIAL NETWORKS AND THEIR IMPACTS ON BRANDS Edwin Dionel Molina Vásquez.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Communication (II) Chapter 4
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
Social Media – Facebook Vs. Twitter Twitter asks its users to regularly publish short updates about what they’re doing or thinking. Its users answer the.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
FITT Fostering Interregional Exchange in ICT Technology Transfer Communication & Collaboration Tools.
TWITTER What is Twitter, a Social Network or a News Media? Haewoon Kwak Changhyun Lee Hosung Park Sue Moon Department of Computer Science, KAIST, Korea.
Serving Sociologists | Advancing Sociology | Promoting Sociology to Society Facebook in the Classroom.
Cuckoo: Towards Decentralized, Socio-Aware Online Microblogging Services and Data Measurements Tianyin Xu Yang Chen Nanjing University, University of Goettingen.
Microblogs: Information and Social Network Huang Yuxin.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Presented by: Sanketh Beerabbi University of Central Florida.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Lincolnshire and Rutland Public Service Compact “Using new technologies to deliver Leadership and Management Programmes” The role of social networking.
Social Media Primer. Social Media is Great For: Building awareness and attracting new business Fostering community Providing helpful content and information.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
FeedTree: Sharing Web micronews with peer-to-peer event notification Dan Sandler, Alan Mislove, Ansley Post, Peter Druschel Presented by: Anupama Atmakur.
An example of peer-to-peer application
CHAPTER 3 Architectures for Distributed Systems
Early Measurements of a Cluster-based Architecture for P2P Systems
SCOPE: Scalable Consistency in Structured P2P Systems
5.2 FLAT NAMING.
Presentation transcript:

Twittering by Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Tianyin Xu Yang Chen Nanjing University, University of Goettingen University of Goettingen Xiaoming Fu Pan Hui University of Goettingen Deutsche Telekom Laboratories

Outline  Background  Current Problems and Limitations  Key Design Issues of Cuckoo  Future Work 2

Take Twitter as an example: 1.Less than 4 years (launched in October 2006) 2.More than 41 million users as of July 2009; - userbase is still growing exponentially 3. Over 50 million microblogs posted per day Online microblogging services have become tremendously popular in recent years!! Twitter Yammer Plurk Google Buzz Squeelr identi.ca jaiku emote.in Chinese Sina microblogging

MICROBLOGGING’S SOLE FUNCTIONS Publish a microblog Publish a short message (usually < 140 characters) Follow 1. Being a follower means the user receive all the messages from those he follows; 2. A user can follow any other user, and the user being followed need not follow back; No reciprocation, different from Facebook/LinkedIn/…! ACB B follows A and C follows B A´s microblogs are visible to B and B´s microblogs are to C

CDF OF TWITTER FOLLOWERS* *D. R. Sandler et al., Bird of a FETHR: Open, decentralized micropublishing, IPTPS-2009.

There are a few highly- subscribed(followed) celebrities. Twitter serves more as an information spreading medium than an online social network service*. *H. Kwak et al., What is Twitter, a Social Network or a News Media? WWW-2010.

USER CLASSIFICATION ACCORDING TO THEIR SOCIAL RELATIONS* Broadcasters / Celebrities / Influentials Have huge amount of followers News media & celebrities Acquaintances Tend to exhibit reciprocity in their relationships Miscreants / Evangelists Try to contact everyone and hope that someone can follow back Spammers or stalkers *B. Krishnamurthy et al., A Few Chirps About Twitter, WOSN-2008.

Outline  Background  Current Problems and Limitations  Key Design Issues of Cuckoo  Future Work 8

Current microblogging systems are based on centralized architectures! Performance Bottleneck “Over capacity error” - 3% of page requests in June 2008* “Database maintenance error” *E. Williams, Measurable improvements, July 2008,

Current microblogging systems are based on centralized architectures! (cont.) Current Solution Rate limiting - Only allows clients to make a limited number of calls in a given hour. - Twitter: 150 requests per hour, 2,000 requests for whitelist TinyURL - Replaces URLs of a certain length with TinyURL contractions Upper limit on the number of people a user could follow - Orkut: 1000, Flickr: 3000, Facebook: 5000, - Twitter: 2000 before 2009, now using a more sophisticated strategy* *The Effects of Restrictions on Number of Connections in OSNs: A Case-Study on Twitter, WOSN-2010.

Current microblogging systems are based on centralized architectures! (cont.) Security - Vulnerable to malicious attacks and service blocking 1. Twitter did be a victim of DDoS attack* 2. Twitter is currently blocked in several regions due to political reasons - Hard to recovery from central server failure 1. Facebook database outrage cut off about 150,000 users§ * Twitter, Facebook attack targeted one user, l §Facebook database outrage cut off about 15,000,

We need a peer-assisted scheme for microblogging!

Outline  Background  Current Problems and Limitations  Design Rationale of Cuckoo  Future Work 13

SYSTEM ARCHITECTURE: PEER-ASSISTED INSTEAD OF FULLY DISTRIBUTED Fully compatible with current Twitter arch. Push is more efficient than Pull - But… Twitter server (API) only support the “pull” - So gossip push among peers, pull between peers and server Use DHT (Pastry) as underlying infrastructure - support lookup service - improve availability Do not exclude service providers from the picture

HYBRID OVERLAY NETWORKS: STRUCTURED (DHT) + UNSTRUCTURED (GOSSIP) DHT-based overlay: lookup service + improve availability Gossip-based overlay: micro-news dissemination Göttingen DHT

TAKE ADVANTAGE OF SOCIAL RELATIONS Using the 4 social relationships Using the 4 social relationships: FriendFriend - Friend is a reciprocate social link between two users - Friends are acquaint with each other and willing to help each other Neighbor - Users sharing common interests - For example, two user sharing a same followee are neighbors - Neighbors assists the bootstrap & micro-content propagation Followee / Following - Most common one-way connections

4 KINDS OF SOCIAL RELATIONS Friend - Virtual node: help each other to balance load and improve availability - W. Pauli and C. F. Gauss are friend. Partner/Neighbor - Assisted gossip dissemination - Assists bootstrap - D. Hilbert and M. Born are Partner for W. Pauli. Followee / Follower - Direct pushing/sending - W. Pauli pushes new updates to his follower D. Hilbert Göttingen DHT

SOCIO-AWARE UPDATING -- USING DHT-BASED OVERLAY Example: M. Born wakes up, updates the latest status of W. Pauli.  Both of M. Born and D. Hilbert follows W. Pauli (they’re neighbors) => M. Born gets the statuses of W. Pauli directly from D. Hilbert. Pros  Shorten the DHT routing path;  Distribute the traffic of the popular host into its followers. Different kinds of Message Types 1. ReqFollow/RplFollow: address indexing 2. ReqStatus/RplStatus: content indexing Göttingen DHT

MICRO-CONTENT PROPAGATION -- USING GOSSIP-BASED DISTRIBUTION Normal Users  Directly pushing messages;  90% users have less than 100 followers. Broadcasters (W. Pauli in this example)  Gossip-based push between neighbors (B. Riemann and J. von Neumann are relay nodes). Göttingen DHT

ROLE OF SERVICE PROVIDERS Achieving better quality of service Support synchronization for peers with asynchronized access Guarantee high availability (always online) Nothing to lose, nothing to change Fully compatible with current architecture Will not lose any functionalities nor user communities Keep all the precious resources (profile & microblogs) as before Excellent platform for third party developers to enrich additional functions Simple functions on the server side and more colorful functions between peers Our Objective  Help the service provides, but not to bury them!

INCENTIVES FOR SERVICE PROVIDERS AND END USERS For Service Providers Low Bandwidth CostLow Bandwidth Cost High scalability High security Will not lose any functionality nor user community For End Users High reliabilityHigh reliability - store locally, easy to recovery - store locally, easy to recovery Better Quality of ExperienceBetter Quality of Experience - low response latency, high searching efficiency, less service unavailability - low response latency, high searching efficiency, less service unavailability Enrichment of Additional Functions - Third-party developers can implement new functions (not supported by service providers) based on the underlying overlay network

Outline  Background  Current Problems and Limitations  Design Rationale of Cuckoo  Future Work 22

FUTURE WORK 1. Support “topic trend” functions Currently, a quite common use for microblogging is looking at particular topics - e.g., UK general election 2. Supporting user mobility 3. Group Communication Can we build a group communication (multicast)? - Should based on gossip protocol; - Like FeedTree on Scribe on Pastry; 4. Add some functions on the server side

Thanks! Welcome to our website!