A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Stefan Schmid & Christian Scheideler Dept. of Computer Science
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
Fabian Kuhn, Microsoft Research, Silicon Valley
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Robust Mixing for Structured Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
How To Explore a Fast Changing World (On the Cover Time of Dynamic Graphs) Chen Avin Ben Gurion University Joint work with Michal Koucky & Zvi Lotker (ICALP-08)
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
A DoS-Resilient Information System for Dynamic Data Management Stefan Schmid & Christian Scheideler Dept. of Computer Science University of Paderborn Matthias.
Decomposing Networks and Polya Urns with the Power of Choice Joint work with Christos Amanatidis, Richard Karp, Christos Papadimitriou, Martha Sideri Presented.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Towards Scalable and Robust Distributed Systems Christian Scheideler Institut für Informatik Technische Universität München.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Towards Scalable and Robust Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München Baruch Awerbuch Dept. of Computer.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Controller and Estimator for Dynamic Networks Amos Korman Shay Kutten Technion.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Improved Approximation Algorithms for the Quality of Service Steiner Tree Problem M. Karpinski Bonn University I. Măndoiu UC San Diego A. Olshevsky GaTech.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
SHELL: A Distributed and Oblivious Heap with Applications for Robust Information Systems and Heterogeneous Peer-to-Peer Networks Christian Scheideler Stefan.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Skiplist-based Concurrent Priority Queues Itay Lotan Stanford University Nir Shavit Sun Microsystems Laboratories.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Middleware issues: From P2P systems to Ad Hoc Networks
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Reorganization in Network Regions for Optimality and Fairness Robert E. Beverly IV, MSc Thesis.
Towards a Scalable and Robust DHT Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
Peer-to-Peer Data Structures Christian Scheideler Dept. of Computer Science Johns Hopkins University.
Robust Random Number Generation for Peer-to-Peer Systems Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Peer-to-Peer Networks 07 Degree Optimal Networks
Christian Scheideler Dept. of Computer Science
Data Center Network Architectures
(How the routers’ tables are filled in)
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
On Growth of Limited Scale-free Overlay Network Topologies
Peer-to-Peer Networks 07 Degree Optimal Networks
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Overlay Networking Overview.
Presentation transcript:

A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn

Motivation P2P systems: significant amount of attention. Holy grail: P2P systems that are highly scalable and robust Internet

Motivation P2P systems face many threats: stop/fail attacks, join/leave attacks, Eclipse attacks, Sybil attacks, Denial-of-Service attacks, content pollution,… Internet

Sybil Attacks Goal: flood network with fake peers Effect: disconnect good peers, drop messages, drop or manipulate data,… Internet

Sybil Attacks Previous solutions: Douceur 02: Use trusted authority to limit generation of identities Bazzi et al. 05/06: Limit identities created at a particular location (e.g., within an ISP) of the Internet Danezis et al. 05, Yu et al. 06: Network based on social contacts Margolin & Levine 07: Game theory General approach: add constraints Our approach: working P2P network despite Sybil attacks

Our Approach Connect to the older peers!

Our Approach Similar to preferential attachment graphs. Hope: peers already in the system when Sybil attack starts are not affected by it Network Entry Point

How to connect to older peers? Naive solution: Connection to d older peers chosen uniformly at random: How to join and leave efficiently? Not a self-routing topology! Better: distributed heap based on de Bruijn graph

Dynamic de Bruijn Network Classical network theory: family of graphs Example: d-dim. de Bruijn graph G=(V,E) V = {0,1} d E = { {x,y} | x=(x 1,…,x d ), y=(b,x 1,…,x d-1 ), for some b  {0,1} } We need: dynamic form of de Bruijn graph (nodes join and leave)

Dynamic de Bruijn Network Example: d-dim. de Bruijn graph G=(V,E) V = {0,1} d E = { {x,y} | x=(x 1,…,x d ), y=(b,x 1,…,x d-1 ), for some b  {0,1} } Represent (x 1,…,x d ) as 0.x 1 x 2 …x d  [0,1), e.g = 1  (1/2) + 0  (1/4) + 1  (1/8) Let d 

Dynamic de Bruijn Network Example: d-dim. de Bruijn graph G=(V,E) V = {0,1} d E = { {x,y} | x=(x 1,…,x d ), y=(b,x 1,…,x d-1 ), for some b  {0,1} } Result for d  : V = [0,1) E = { {x,y}  [0,1) 2 | y=x/2 or y=(1+x)/2 }

Dynamic de Bruijn Network Continuous de Bruijn graph: V = [0,1) E = { {x,y}  [0,1) 2 | y=x/2 or y=(1+x)/2 } 01 For any two regions R, R´:  {x,y}  E: (x,y)  RxR´ or (x,y)  R´xR: each peer in R to all older peers in R´ cut [0,1) into regions of same size assign peers to random points in [0,1) RR´

Dynamic de Bruijn Network Continuous de Bruijn graph: V = [0,1) E = { {x,y}  [0,1) 2 | y=x/2 or y=(1+x)/2 } 01 Dilemma: for any fixed region size EITHER : no neighbors OR : too many neighbors

SHELL SHELL: Hierarchy of de Bruijn networks

SHELL SHELL: distributed heap based on age

SHELL For every node v: v has forward edges to older peers in its home region and de Bruijn regions v has backward edges to all peers that have forward edges to it Level of v is the lowest s.t. v´s home region contains at least c log n v older nodes in this and higher levels (n v : total # nodes older than v) (How does v know?) Forward degree: O(log n), backward degree: O(log 2 n) (w.h.p., based on random positions of peers)

SHELL Routing between two peers v and w: 1.use deBruijn routing along forward edges till region of w reached 2.descend along backward edges till w reached v w 1. 2.

SHELL Routing between two nodes v and w: 1.use deBruijn routing along forward edges till region of w reached 2.descend along backward edges till w reached v 1. forward edge youngest peer

SHELL Routing between two nodes v and w: 1.use deBruijn routing along forward edges till region of w reached 2.descend along backward edges till w reached Nice properties: Only nodes visited that are at least as old as v and w When every node v sends packet to random w, congestion at most O(log 2 n) w.h.p. 

SHELL Join(v): 1.find right region in right level prescribed by order n v and random point assigned to v O(log n) time w.h.p. (use routing) 2.integrate v into SHELL and adapt regions of neighbors (if needed) O(1) time, O(log 2 n) work w.h.p. (for general heap) v wExpected O(1) lifts per level O(log n) work per lift w.h.p. Join/leave verkehrt!!

SHELL Leave(v): Remove v from SHELL and adapt regions of neighbors (if needed) O(1) time, O(log 2 n) work w.h.p. v w Expected O(1) drops per level O(log n) work per drop w.h.p.

SHELL Problem: node v needs to estimate its order n v (i.e. # nodes older than v) Solution: B(j): number of nodes in home region of v in level j that are older than v v finds largest j so that j < B(j)/c – log B(j) Chosen level deviates by  1 from ideal level w.h.p.

Distributed Heaps Concurrent heaps: Shavit & Zemach 99: skip queue Shavit & Zemach 00: funnel tree not applicable in our context Distributed heaps: Bhargava et al. 04: PAGODA join/leave: O(log 2 n) time and work

Main Results Theorem: For any Sybil attack after step t 0, all peers that were in the SHELL system before t 0 can still perform reliable and efficient routing (and based on that, also data management). SHELL can also be applied as scalable, low- congestion network for peers with arbitrary bandwidths.

Conclusion SHELL: distributed heap with essentially optimal runtime for routing, joining and leaving Future tasks: Better congestion (O(log 2 n) down to O(log n)) Locality Realization?