Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.

Slides:



Advertisements
Similar presentations
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
Advertisements

1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Topological Hole Detection Ritesh Maheshwari CSE 590.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Niloy Ganguly Complex Networks Research Group Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Collaborators.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 A Random-Surfer Web-Graph Model (Joint work with Avrim Blum & Hubert Chan) Mugizi Rwebangira.
Ad-Hoc Networks Beyond Unit Disk Graphs
Graph & BFS.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
1 Random Walks in WSN 1.Efficient and Robust Query Processing in Dynamic Environments using Random Walk Techniques, Chen Avin, Carlos Brito, IPSN 2004.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
MULTICASTING Network Security.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
J. He, G. Kesidis and D.J. Miller – The Pennsylvania State University In collaboration with K. Levitt, J. Rowe, S.F. Wu – The University of California.
P2P Architecture Case Study: Gnutella Network
P2P Group Meeting (ICS/FORTH) Monday, 21 February, 2005 Making Gnutella-like P2P Systems Scalable (Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
Content-Based Music Information Retrieval in Wireless Ad-hoc Networks.
Niloy Ganguly (Zentrum für Hochleistungsrechnen (ZHR) – TU Dresden) Project funded by the Future and Emerging Technologies arm of the IST Programme Immune.
Introduction to Graphs. Introduction Graphs are a generalization of trees –Nodes or verticies –Edges or arcs Two kinds of graphs –Directed –Undirected.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Stefan Rührup 1 HEINZ NIXDORF INSTITUTE University of Paderborn, Germany Algorithms and Complexity Competitive Time and Traffic Analysis of Position-based.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
Complex Network Theory – An Introduction Niloy Ganguly.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
A configuration method for structured P2P overlay network considering delay variations Tomoya KITANI (Shizuoka Univ. 、 Japan) Yoshitaka NAKAMURA (NAIST,
Design of a Robust Search Algorithm for P2P Networks
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
OBJECT LOCATION IN UNSTRUCTURED P2P NETWORKS USING RANDOM WALK
CS 326A: Motion Planning Probabilistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces (1996) L. Kavraki, P. Švestka, J.-C. Latombe,
Interconnection topologies
On Growth of Limited Scale-free Overlay Network Topologies
Niloy Ganguly, Andreas Deutsch Center for High Performance Computing
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
Fast Nearest Neighbor Search on Road Networks
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Department of Computer Science University of York
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Lecture 2: Complex Networks
Data Communication: Routing algorithms
Presentation transcript:

Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect to the fast coverage of networks? Niloy Ganguly, Andreas Deutsch Center for High Performance Computing Technical University Dresden, Germany

Apr 13, Talk Overview Problem Definition Experimental Results Theoretical Abstraction

Apr 13, Networks Network = (peers, neighborhood) a d bc ef g a c b f g d e Peer host data – no connection between data and peer. not possible to devise a deterministic function to reach from a particular peer to a particular data

Apr 13, Unstructured Networks Unstructured Network Searching in unstructured networks – Non-deterministic Algorithms Flooding, random walk Our algorithms – packet proliferation and mutation a c b f g d e ? 6!!!

Apr 13, Model Definition Topology Data and query distribution Algorithms Metrics

Apr 13, Topology Definition Random Graph No of Nodes = 10000, Mean Indegree ≈ 4 Power-law graph No of Nodes = 10000, Mean Indegree ≈ 4 Grid No of Nodes = 10000, Mean Indegree = 4

Apr 13, Query/Data Distribution Query/Data – 10 bit strings – 1024 unique queries/data (tokens) – Distributed based on Zipf’s Law power law - frequency of occurrence of a token T α 1/r, rank of the token a c b f g d e

Apr 13, Forwarding Algorithms Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Restricted Proliferation/Mutation Algorithm (RPM) Random Walk Algorithms Simple Random Walk Algorithm (RW) Restricted Random Walk Algorithm (RRW) High Degree Restricted Random Walk Algorithm ( HDRRW )

Apr 13, Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighboring nodes a c b f g d e N = 3

Apr 13, Proliferation/Mutation Algorithms Restricted Proliferation/Mutation Algorithm (RPM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighboring nodes if free a c b f g d e N = 3

Apr 13, Proliferation Controlling Function Production of N messages depends on a. Proliferation constant (ρ) b. Hamming distance between message and data c. Always ≥ 1 and ≤ no of neighbors ab

Apr 13, Random Walk Algorithms Simple Random Walk Algorithm (RW) Forward the message to a randomly selected neighbor a c b f g d e

Apr 13, Random Walk Algorithms Restricted Random Walk Algorithm (RRW) Forward the message to a randomly selected free neighbor a c b f g d e

Apr 13, Random Walk Algorithms High Degree Restricted Random Walk Algorithm (HDRRW) Forward the message to the free neighbor which has highest number of neighbors a c b f g d e

Apr 13, Metrics and Experiment Network coverage efficiency No of time steps required to cover the entire network Time Step - A time step is the period within which all the nodes operate once in a random sequence Experiment Coverage – Calculate time taken to cover the entire network after initiation of a search from a randomly selected initial node. Repeated for 500 such searches.

Apr 13, Fairness Criteria Comparing a random walk algorithm with a proliferation algorithm (RRW and RPM) Both processes work with same average number of packets. RRW RPM

Apr 13, Forwarding Algorithms Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Restricted Proliferation/Mutation Algorithm (RPM) Random Walk Algorithms Simple Random Walk Algorithm (RW) Restricted Random Walk Algorithm (RRW) High Degree Restricted Random Walk Algorithm ( HDRRW )

Apr 13, Comparison Between RPM and RRW on Different Topologies Experimental Result Experiment Coverage Network coverage time RRW > RPM Network coverage time power- law Network > grid > random network HDRRW is better than RRW, however only slightly

Apr 13, Defining the REAL Problem Why do Proliferation work better than random walk ? Can we theoretically answer? A first attempt Make the problem simpler. Consider only grid topology

Apr 13, Compare the two systems? Random Walk K (= 4) random walk What is the time taken to cover all the nodes in the network? (with some confidence level?) x

Apr 13, Compare the two systems? Proliferation K’ (= 2) initial messages. At every time step, increase message packets by α factor. So at t = 1, K ’(1+ α) t = 2, K ’(1+ α) 2 t = n, K ’(1+ α) n K ’ + K ’(1+ α) + K ’(1+ α) 2 + ……+ K ’(1+ α) n = K.(n + 1) K ’ = K.(n + 1). α / ((1+ α) n ) x

Apr 13, Compare the two systems? Proliferation K’ (= 2) initial messages. At every time step, increase message packets by α factor. So at t = 1, K ’(1+ α) t = 2, K ’(1+ α) 2 t = n, K ’(1+ α) n So what is the time taken to cover the network????