The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.

Slides:



Advertisements
Similar presentations
Routing in Poisson small-world networks A. J. Ganesh Microsoft Research, Cambridge Joint work with Moez Draief.
Advertisements

The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
1 Analyzing Kleinberg’s Small-world Model Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Small-world networks.
Milgram-Routing in Social Networks
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili
Online Social Networks and Media Navigation in a small world.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Information Networks Small World Networks Lecture 5.
Symphony: Distributed Hashing in a Small World Gurmeet Singh Manku Mayank Bawa Prabhakar Raghavan Presented by Satpreet Singh.
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
Company LOGO 1 Identity and Search in Social Networks D.J.Watts, P.S. Dodds, M.E.J. Newman Maryam Fazel-Zarandi.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
University of Oregon Slides from Gotz and Wehrle + Chord paper
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Analysis of Social Information Networks Thursday January 27 th, Lecture 2: Algorithmic Small World 1.
Mercury: Supporting Scalable Multi-Attribute Range Queries A. Bharambe, M. Agrawal, S. Seshan In Proceedings of the SIGCOMM’04, USA Παρουσίαση: Τζιοβάρα.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
P2P Course, Structured systems 1 Skip Net (9/11/05)
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
P2P Course, Structured systems 1 Introduction (26/10/05)
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Distributed Hash Table Systems Hui Zhang University of Southern California.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Proof of Kleinberg’s small-world theorems
Small-world networks. What is it? Everyone talks about the small world phenomenon, but truly what is it? There are three landmark papers: Stanley Milgram.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Searching via Your Neighbor’s Neighbor: The Power of Lookahead in P2P Networks Moni Naor Udi Wieder The Weizmann Institute of Science Gurmeet Manku Stanford.
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Chapter 5 Naming (I) Speaker : Jyun-Yao Huang 1 Application and Practice of Distributed Systems.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Small-world phenomenon: An Algorithmic Perspective Jon Kleinberg.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
A Scalable Peer-to-peer Lookup Service for Internet Applications
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Peer-to-Peer and Social Networks
Proof of Kleinberg’s small-world theorems
A Scalable Peer-to-peer Lookup Service for Internet Applications
Presentation transcript:

The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun

Small World Phenomenon Any two individuals in the network are likely to be connected through a short sequence of intermediate acquaintances. A significant area of study in the social sciences. A fundamental ingredient in the structural evolution of the World Wide Web.

Small World Phenomenon Question: Why should there exist short chain of acquaintances linking together arbitrary pairs of strangers? Answer: Random networks have low diameter

Small World Phenomenon Edges of the network are divided into “local” and “long-range” contacts. Re-wired ring lattice: set V of n points spaced uniformly on a circle. each point is connected to each of its k nearest neighbors, for a small constant k. small number of edges in which the endpoints are chosen uniformly at random from V.

Small World Phenomenon Two fundamentally surprising discoveries: There should exist such sort chains in the network of acquaintanceships. (existential) People should be able to find these chains knowing so little about the target individual. (algorithmic)

Small World Phenomenon Question: Why should arbitrary pairs of strangers be able to find short chains of acquaintances that link them together? What properties should a social network must posses in order for it to exhibit the cues and enable its members to find short chains through it?

The Model: Networks and Decentralized Algorithms Two dimensional grid and directed edges. Nodes: Lattice distance: d((i,j),(k,l)) = |k-i| + |l-j| Local contacts: node u has a directed edge to every other node within lattice distance p. (p>=1)

The Model II Long-ranged contacts: For universal constants q>=0, r>=0: Directed edges from u to q other nodes. The i-th directed edge from u has endpoint v with probability proportional to:

The Model III

The Model IV The model has a simple “geographic” interpretation: individuals live on a grid and know their neighbors for some number of steps in all directions; they also have some number of acquaintances distributed more broadly across the grid. Viewing p and q as fixed constants, we obtain a one-parameter family of network models by tuning the value of the exponent r.

Decentralized algorithm The goal: starting with two arbitrary nodes in the network (s and t) transmit a message from s to t in as few steps as possible. The message holder u in a given step has a knowledge of: The set of local contacts among all nodes The location, on the lattice, of the target t The locations and long-range contacts of all nodes that have come in contact with this message

Theorem 1 There is a constant a 0, depending on p and q but independent of n, so that when r=0 (the uniform distribution), the expected delivery time of any decentralized algorithm is at least a 0 n 2/3. When long-range contacts are formed independently of the geometry of the grid, short chains exist but the nodes will not be able to find them.

Theorem 1 (cont.) We consider the set U of all nodes within lattice distance n 2/3 of t. With high probability, the source s will lie outside of U, and if the message is never passed from a node to a long-ranged contact in U, the number of steps needed to reach t will be at least proportional to n 2/3. But the probability that any message holder has a long-range contact in U is roughly n -2/3, so the expected number of steps before a long-range contact in U is found is at least proportional to n 2/3 as well.

Theorem 2 There is a decentralized algorithm  and a constant a 2,independent of n, so that when r=2 (the inverse square distribution) and p=q=1, the expected delivery time of  is at most a 2 (logn) 2.  : in each step, the current message holder u chooses a contact that is as close to the target t as possible.

Theorem 2 (cont.) At exponent r=2 a node’s long-range contacts are nearly uniformly distributed over all “distance scales”. Given any node u, we can partition the remaining nodes of the lattice into sets A 0, A 1, …, A log n, where A j consists of all nodes whose lattice distance to u is between 2 j and 2 j+1.

Theorem 2 (cont.) At exponent r=2, each long-range contact of u is nearly equally likely to belong to any of the sets A j ; when r 2, there is a bias toward sets A j at nearer distances.

Theorem 3 Let 0<=r<2. There is a constant a r, depending on p, q, r, but independent of n, so that the expected delivery time of any decentralized algorithm is at least a r n (2-r)/3 Let r>2. Delivery time a r n (r-2)/(r-1)

Small World Phenomenon

We can generalize our results to k-dimensional lattice networks, for constant values of k, as well as less structured graphs with analogous scaling properties. In the k-dimensional case, a decentralized algorithm can construct paths of lengths polynomial in log n if and only if r = k A network should contain latent structural cues that can be used to guide a message towards a target.

Conclusion While we have focused on a very clean model, we believe that a more general conclusion can be drawn for small-world networks: that the correlation between local structure and long-range connections provides fundamental cues for finding paths through the network.

Symphony: Distributed Hashing In A Small World

Symphony A protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them long distance contacts drawn from a family of harmonic distributions. The construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency. The cost of updates when hosts join and leave is small.

Symphony Scalability: The protocol should work for a range of networks of arbitrary size. Stability: Hosts with arbitrary arrival and departure times, typically with small lifetimes. Performance: Low latency for hash lookup and low maintenance cost in the presence of frequent joins and leaves.

Symphony Flexibility: Smooth trade-offs between performance and state management complexity. Simplicity: Easy to understand, code, debug and deploy.

Symphony Core idea: place all hosts along a ring and equip each node with a few long-range links. With k=O(1) links per node, it is possible to route hash lookups with an average latency of O(1/k (logn) 2 ) hops.

Symphony: The Protocol Let I denote the unit interval [0,1) that wraps around. Whenever a node arrives, it chooses as its id a real number from I uniformly at random. A node manages that sub-range of I which corresponds to the segment on the circle between its own id and that of its immediate clockwise predecessor. A node maintains two short links with its immediate neighbors.

Symphony: The Protocol If a hash function maps an object to an m- bit hash key K, then the manager for this hash entry is the node whose sub-range contains the real number K/2 m. Every node has k>=1 long-range links. For each such link, a node first picks a random number x from a probability distribution function. Then it contacts the manager of x.

Symphony: The Protocol Probability distribution function (pdf): p n, where n denotes the current number of nodes. The function p n (x) takes the value 1/(x*ln n) when x lies in the range [1/n, 1], and is 0 otherwise. Pdf belongs to a family of harmonic distributions. Problems: estimation of n, choice of k.

Unidirectional Routing Protocol When a node wishes to lookup a hash key x from I, it forwards a lookup for x along that link (short or long) that minimizes the clockwise distance to x. The expected path length with unidirectional routing in an n-node network with k=O(1) links is O(1/k*(log n) 2 ) hops.

Bidirectional Routing Protocol A node routes a lookup for x along that link (incoming or outgoing) that minimizes the absolute distance to x. The expected path length with bidirectional routing in an n-node network with k=O(1) links is O(1/k*(log n) 2 ) hops. The constant hidden behind the big-O notation is less than 1.

Estimation Protocol Let X s denote the sum of segment lengths managed by any set of s distinct nodes. Then s/X s is an unbiased estimator for n. The estimate improves as s increases. Choice of s: s=3 is good enough in practice. A node estimates n by using the length of the segment it partitions and its two neighboring segments. These three segment length are readily available at no extra cost from the two nodes between which x inserts itself in the ring.

Conclusion Symphony scales well, has low lookup latency and maintenance cost with only a few neighbors per node. In particular, s=3 neighbors suffice for the Estimation Protocol and k=4 long-range links with Bidirectional routing are sufficient for low latencies in networks as big as 2 15 nodes.