Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

‘Small World’ Networks (An Introduction) Presenter : Vishal Asthana
Emergence of Scaling in Random Networks Albert-Laszlo Barabsi & Reka Albert.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
It’s a Small World by Jamie Luo. Introduction Small World Networks and their place in Network Theory An application of a 1D small world network to model.
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
School of Information University of Michigan Network resilience Lecture 20.
Efficient Search - Overview Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
Decentralized resource management for a distributed continuous media server Cyrus Shahabi and Farnoush Banaei-Kashani IEEE Transactions on Parallel and.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Searching in Unstructured Networks Joining Theory with P-P2P.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Random Graph Models of Social Networks Paper Authors: M.E. Newman, D.J. Watts, S.H. Strogatz Presentation presented by Jessie Riposo.
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
Information Networks Power Laws and Network Models Lecture 3.
P2P Architecture Case Study: Gnutella Network
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Paraskevi Raftopoulou 1,2 Paraskevi Raftopoulou 1,2 and Euripides G.M. Petrakis 2 1 Max-Planck Institute for Informatics, Saarbruecken, Germany
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Self-Similarity of Complex Networks Maksim Kitsak Advisor: H. Eugene Stanley Collaborators: Shlomo Havlin Gerald Paul Zhenhua Wu Yiping Chen Guanliang.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
3. SMALL WORLDS The Watts-Strogatz model. Watts-Strogatz, Nature 1998 Small world: the average shortest path length in a real network is small Six degrees.
Networks Igor Segota Statistical physics presentation.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Most of contents are provided by the website Network Models TJTSD66: Advanced Topics in Social Media (Social.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
Percolation Percolation is a purely geometric problem which exhibits a phase transition consider a 2 dimensional lattice where the sites are occupied with.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Group Multicast Capacity in Large Scale Wireless Networks
A Study of Group-Tree Matching in Large Scale Group Communications
On Growth of Limited Scale-free Overlay Network Topologies
Peer-to-Peer and Social Networks
The Watts-Strogatz model
Chi Zhang, Yang Song and Yuguang Fang
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Coverage and Connectivity in Sensor Networks
Department of Computer Science University of York
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Lecture 9: Network models CS 765: Complex Networks
Topology Mapping Bo Sheng Sept. 15.
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai

2 December 2003Mohammad Al Rifai Outline  Introduction  Motivation  Flooding search  Probabilistic Flooding  Percolation Theory  TTL selection policy  Summary  Questions

2 December 2003Mohammad Al Rifai Introduction Motivation - improving scalability of flooding search applied in unstructured P2P networks (Gnutella) Proposed approach - recognizing P2P networks as Complex Systems, and exploiting the accurate statistical models used to characterize them for formal analysis and efficient design of P2P networks.

2 December 2003Mohammad Al Rifai Introduction Flooding search Each query is flooded through the entire network

2 December 2003Mohammad Al Rifai Introduction Flooding search Each query is flooded through the entire network  Algorithm: – a node initiates a query, sets TTL value, sends the query to all of its neighbors.

2 December 2003Mohammad Al Rifai Introduction Flooding search Each query is flooded through the entire network  Algorithm: – a node initiates a query, sets TTL value, sends the query to all of its neighbors. – each receiver of the query decrements TTL by one, forwards t he query to its neighbors in turn, and so on

2 December 2003Mohammad Al Rifai Introduction Flooding search Each query is flooded through the entire network  Algorithm: – a node initiates a query, sets TTL value, sends the query to all of its neighbors. – each receiver of the query decrements TTL by one, forwards t he query to its neighbors in turn, and so on – the flooding continues till the object is found.

2 December 2003Mohammad Al Rifai Introduction Flooding search Each query is flooded through the entire network  Algorithm: – a node initiates a query, sets TTL value, sends the query to all of its neighbors. – each receiver of the query decrements TTL by one, forwards t he query to its neighbors in turn, and so on – the flooding continues till the object is found.

2 December 2003Mohammad Al Rifai Introduction Flooding search  Problems : – extra overhead through duplicated queries - initial TTL is set regardless of the size of the network

2 December 2003Mohammad Al Rifai Introduction Flooding search  Problems : – extra overhead through duplicated queries - initial TTL is set regardless of the size of the network does not scale

2 December 2003Mohammad Al Rifai Introduction Flooding search  Problems : – extra overhead through duplicated queries - initial TTL is set regardless of the size of the network does not scale  Proposed solutions: 1- Probabilistic flooding search 2- TTL self selection policy

2 December 2003Mohammad Al Rifai I- Probabilistic Flooding Each node forwards the query to its neighbors with probability p, and drops the query with probability (1 – p ). The normal flooding search is an extreme case of probabilistic flooding with p =1.

2 December 2003Mohammad Al Rifai Each node forwards the query to its neighbors with probability p, and drops the query with probability (1 – p ). The normal flooding search is an extreme case of probabilistic flooding with p =1. I- Probabilistic Flooding By decreasing the value of p, the probabilistic flooding cuts some paths (not only redundant ones).

2 December 2003Mohammad Al Rifai Each node forwards the query to its neighbors with probability p, and drops the query with probability (1 – p ). The normal flooding search is an extreme case of probabilistic flooding with p =1. I- Probabilistic Flooding By decreasing the value of p, the probabilistic flooding cuts some paths (not only redundant ones).

2 December 2003Mohammad Al Rifai Each node forwards the query to its neighbors with probability p, and drops the query with probability (1 – p ). The normal flooding search is an extreme case of probabilistic flooding with p =1. decreasing the value of p furthermore towards 0, cuts more and more paths, and turns out law reachability, thus an inefficient search. I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Each node forwards the query to its neighbors with probability p, and drops the query with probability (1 – p ). The normal flooding search is an extreme case of probabilistic flooding with p =1. decreasing the value of p furthermore towards 0, cuts more and more paths, and turns out law reachability, thus an inefficient search. I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Goal: all redundant paths must be cut effectively to eliminate duplicated queries and avoid the overhead cost, while full reachability must be preserved. How? p must be tuned to an optimal (critical) operating point p c. to achieve that, the system must be formally modeled. I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Formalizing and modeling the P2P networks unstructured P2P networks are large-scale, dynamic, and self-configure systems, which are the main characteristics of Complex Systems. Hence, P2P networks can be recognized as Complex Systems, and theoretical and statistical models applied on Complex Systems can be exploited with P2P networks. Percolation Theory is one of the most important theories applied on Complex Systems that can help to find the critical value p c. I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Given a 2D lattice of some sites (dots) and bonds (lines) connecting neighboring sites as shown I- Probabilistic Flooding – Percolation Theory

2 December 2003Mohammad Al Rifai Given a 2D lattice of some sites (dots) and bonds (lines) connecting neighboring sites as shown I- Probabilistic Flooding – Percolation Theory (in terms of P2P networks, sites are nodes and bonds are links between them)

2 December 2003Mohammad Al Rifai Given a 2D lattice of some sites (dots) and bonds (lines) connecting neighboring sites as shown Assuming that each bond can be open with probability p, or closed with probability (1 – p ). depending on p, some clusters (sites connected by open bonds) starts to appear. I- Probabilistic Flooding – Percolation Theory (in terms of P2P networks, sites are nodes and bonds are links between them)

2 December 2003Mohammad Al Rifai Given a 2D lattice of some sites (dots) and bonds (lines) connecting neighboring sites as shown. I- Probabilistic Flooding – Percolation Theory (in terms of P2P networks, sites are nodes and bonds are links between them) The larger the value of p, the larger the size of clusters is. Assuming that each bond can be open with probability p, or closed with probability (1 – p ).

2 December 2003Mohammad Al Rifai Given a 2D lattice of some sites (dots) and bonds (lines) connecting neighboring sites as shown. Giant cluster I- Probabilistic Flooding – Percolation Theory Due to Percolation Theory: above a threshold probability p c, a giant cluster spanning the whole lattice starts to appear. (in terms of P2P networks, sites are nodes and bonds are links between them) Assuming that each bond can be open with probability p, or closed with probability (1 – p ).

2 December 2003Mohammad Al Rifai I- Probabilistic Flooding – Percolation Theory - Unstructured P2P networks are random graphs of size N ∞, with connectivity distribution P(k). - nodes and links between them may be thought of as sites and bonds respectively in terms of Percolation Theory.

2 December 2003Mohammad Al Rifai - Unstructured P2P networks are random graphs of size N ∞, with connectivity distribution P(k). - nodes and links between them may be thought of as sites and bonds respectively in terms of Percolation Theory. I- Probabilistic Flooding – Percolation Theory Percolation Theory verifies that once probabilistic flooding is applied, above a threshold p c the giant cluster spans the whole network with minimum connectivity.

2 December 2003Mohammad Al Rifai - Unstructured P2P networks are random graphs of size N ∞, with connectivity distribution P(k). - nodes and links between them may be thought of as sites and bonds respectively in terms of Percolation Theory. I- Probabilistic Flooding – Percolation Theory Percolation Theory verifies that once probabilistic flooding is applied, above a threshold p c the giant cluster spans the whole network with minimum connectivity. How could p c be computed ?

2 December 2003Mohammad Al Rifai Analysis: The following assumption has been made: “ percolation threshold takes place when each node i connected to a node j in the spanning cluster, is also connected to at least one other node” I- Probabilistic Flooding i j

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding k i : the degree of node i Expected value of k i

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding Conditional probability of a node i having k i degree, given that it is connected to j

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding But due to Bayes rule,

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding where, But due to Bayes rule,

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding where, But due to Bayes rule, N : total number of nodes

2 December 2003Mohammad Al Rifai Analysis: this criterion can be written as follows: I- Probabilistic Flooding where, But due to Bayes rule, Thus, at criticality:

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding Given the connectivity distribution of the network using probability flooding results in the effective connectivity distribution as follows:

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding (2) Given the connectivity distribution of the network using probability flooding results in the effective connectivity distribution as follows:

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding (2) Given the connectivity distribution of the network using probability flooding results in the effective connectivity distribution as follows:

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding (2) Given the connectivity distribution of the network using probability flooding results in the effective connectivity distribution as follows:

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding …(3)

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding …(4)

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding …(5) from (3) and (4) the ratio of the second to first moment is: is the ratio of the second to first moment of the actual graph.

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding …(5) from (3) and (4) the ratio of the second to first moment is: is the ratio of the second to first moment of the actual graph. Gnutella network follows power-law connectivity distribution C is a normalization factor Power-law exponent (6) Exponential cutoff factor required for representing real-world networks

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding the ratio α is computed from equation (6), (7) Hence, p c is a factor of cutoff-index v and τ

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding the ratio α is computed from equation (6), (7) Hence, p c is a factor of cutoff-index v and τ Li τ ( x ) : τ-th Ploylogarithm of x

2 December 2003Mohammad Al Rifai Analysis: I- Probabilistic Flooding the ratio α is computed from equation (6), Hence, p c is a factor of cutoff-index v and τ (7) For Gnutella, the power-law exponent is estimated as low as 1.4 and as high as 2.3 in different times, and v is in the range of 100 to 1000.

2 December 2003Mohammad Al Rifai Power-law Exponent τ = 2.3 Power-law Exponent τ = pcpc Cut-off index v Critical probability can be less than 0.01 Hence, flooding cost is reduced by more than 99% without losing reachability I- Probabilistic Flooding v

2 December 2003Mohammad Al Rifai Power-law Exponent τ = 2.3 Power-law Exponent τ = pcpc Cut-off index v Critical probability can be less than 0.01 Hence, flooding cost is reduced by more than 99% without losing reachability I- Probabilistic Flooding v i.e. scalable search

2 December 2003Mohammad Al Rifai II- TTL selection policy Problem: in normal flooding search TTL is restricted to the initial value set by the search originator regardless of the actual size of the network. i.e. not scalable

2 December 2003Mohammad Al Rifai II- TTL selection policy Solution: selection policy is based on the typical length λ of the shortest path between two randomly chosen nodes on any random graph, which is provided by Newman as follows: Problem: in normal flooding search TTL is restricted to the initial value set by the search originator regardless of the actual size of the network. i.e. not scalable

2 December 2003Mohammad Al Rifai Problem: in normal flooding search TTL is restricted to the initial value set by the search originator regardless of the actual size of the network. i.e. not scalable Solution: selection policy is based on the typical length λ of the shortest path between two randomly chosen nodes on any random graph, which is provided by Newman as follows: II- TTL selection policy N Average number of active nodes is not heavily variant in short time-intervals z1 number of neighbors which are one hop away z2 number of neighbors which are two hops away

2 December 2003Mohammad Al Rifai II- TTL selection policy Solution: Each node estimates z 1 and z 2 periodically with local ping packets, and sets TTL of its query to the estimated typical length of path between two nodes λ. Problem: in normal flooding search TTL is restricted to the initial value set by the search originator regardless of the actual size of the network. i.e. not scalable

2 December 2003Mohammad Al Rifai II- TTL selection policy Solution: Each node estimates z 1 and z 2 periodically with local ping packets, and sets TTL of its query to the estimated typical length of path between two nodes λ. TTL is adapted based on information collected locally, hence: scalable TTL selection Problem: in normal flooding search TTL is restricted to the initial value set by the search originator regardless of the actual size of the network. i.e. not scalable

2 December 2003Mohammad Al Rifai Summary Flooding search scalability is improved by employing probabilistic flooding search and adopting new TTL selection policy. Percolation Theory is used to formally analyze P2P networks at critical operation points. Conclusion: theoretical and statistical models applied on Complex Systems can be exploited effectively to formally model and analyzes unstructured P2P networks.

2 December 2003Mohammad Al Rifai Questions ?