Towards Robust and Scalable Peer-to-Peer Social Networks
|
|
|
- Brandon Jordan
- 10 years ago
- Views:
Transcription
1 Towards Robust and Scalable Peer-to-Peer Social Networks Alexandra Olteanu EPFL and Vrije Universiteit Amsterdam Guillaume Pierre Vrije Universiteit Amsterdam Abstract Peer-to-peer Online Social Networks (OSNs) promise to combine the functionalities of centralized OSNs with the good properties of peer-to-peer systems. However, in time, the number of connections between users of OSNs grows super-linearly in the number of users: the average node degree increases with the overall system size. In large-scale settings, mapping each friendship relation into an overlay link will thus overwhelm popular nodes. We propose simple techniques to build and maintain the peer-to-peer OSN overlay while significantly shifting node degrees towards lower ranges. We evaluate our algorithms using real large-scale datasets, and show that they can disseminate information efficiently while controlling node degrees, even in the presence of high churn. Categories and Subject Descriptors H.3.4 [Systems and Software]: Distributed Systems; C.2.1 [Network Architecture and Design]: Distributed networks Keywords Peer-to-peer, Online Social Networks, Scalability, Accesibility, Availability 1. Introduction Online Social Networks(OSNs) are woven into a main part of online operations, and users are increasingly prone to disclosing their privacy on such media. In essence, the commercial transaction between an OSN and its users works as follows: the OSN provides and operates an expensive platform for users, without charging them for usage. In return, users donate their private information, which constitutes the onlyasset anosn canexploittomakeprofits.toallow end users to enjoy the functionalities of an OSN without giving up on their privacy,an alternativeis to structure the OSN as a peer-to-peer(p2p)network[1, 3 6, 8, 9, 11, 12,15 17]. Copyright c ACM,212.Thisistheauthor sversionofthework.itispostedhereby permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of 5th EuroSys Workshop on Social Network Systems (SNS), Bern, Switzerland, April 212, SNS 12 April 1, 212, Bern, Switzerland. Copyright c 212 ACM /12/4... $1. Scalability is an often-overlooked issue in P2P OSNs. A common belief is that the average node degree is constant, independent of the evolution of system size. However, it has been shown that, in time, the average node degree grows polynomially in the number of nodes [13, 14], while the effective diameter shrinks. As a result, currently more than 5% of Facebook users have hundreds or more friends, a fraction that is bound to increase in time [2, 19]. In this context, the cost of mirroring the social network links onto P2P overlay links can be prohibitively high. Hence, the P2P OSN needs to trim the active connections per node, thereby enabling the system to scale and remain practical. This paper shows how a P2P OSN overlay can exploit the high clustering coefficient of the social graph to ensure its own robustness and scalability. The clustering coefficientisdefinedastheprobabilitythattwo nodeswhichare linked to the same third node, are themselves linked together. For example, Facebook s clustering coefficient remains large regardless of the node degree [19]. Additionally, a node s friends of friends have a significant number of friends in common with the node. For instance, for a node with degree 1, more than 5% of the friends of its friends are non-unique. This means that a social network is extremely robust to edge removals and highlights the possibility of aggregating multiple edges into one compound link that serves multiple social relations. We start by organizing the P2P overlay such that overlay links between nodes are mapped onto social links between users. A one-to-one mapping would obviously incur many problems, such as the necessity for the system to maintain large number of connections per node. Instead, we largely reduce the number of overlay links such that the resulting system implements publish-subscribe (pub-sub) functionality.eachuserisassociatedwithonetopicinthepub-subsystem. Establishing a social relation between two users translates into subscribing to each other s topic. Publishing information in the social network translates into publishing information in the pub-sub overlay. In this context, a P2P OSN should satisfy the following requirements: Network scalability. A P2P OSN system must link millions of users without any noticeable loss of performance.
2 Tailored topology. OSN users may have hundreds or thousands of friends. Maintaining active connections with every one of them is expensive, since each reliable connection incurs the cost of periodic messages, or of maintaining connection state (e.g., in TCP). Yet, users with only few friends risk remaining unconnected in a dynamic environment. A P2P OSN system must therefore tailor the number of connections for each node. Connectivity. Updates from one user must reach all her friends. We assume that a user A s updates reach user B ifthereisapathintheoverlaynetworkbetweenaand B.AP2POSNsystemmustensurewithhighprobability that all user friends remain connected. Cost-effective update propagation. Users profiles are often updated, and most of these updates represent small messages.ap2posn must thereforeallow(i)the propagation of updates through a small number of edges; and (ii) the aggregation of different small messages into bigger composite messages, amortizing encapsulation costs. Data Availability. Users may join or leave the network at any time, but their profiles must remain available from otheronlinenodes.ap2posnmustthusprovidemechanisms to ensure high availability and topic-connectivity, even for unpopular users and under high churn rates. Topic-connectivity measures the fraction of users that can bereachedbyalltheirfriendsinthep2p overlay. This paper makes the following main contributions: Asystemmodel.WemaptheOSNontoapub-subsystem where each user, represented by one P2P node, has one topic to publish on. We must distribute updates for this topic to all friendsof this user, who express their friendshipbysubscribingtothistopic.thisallowsonetobuild all required OSN functionality. A system design. Implementing this pub-sub system in a naive way, where pub-sub links are mapped onto the friendship links, is inefficient: popular topics will have too many links, while unpopular ones will not have enough. For avoiding this, we adapt the SpiderCast protocol [7], which exploits the fact that OSNs have a high clustering coefficient[19]. An overlay-friendly replication scheme. The overlay built in this way keeps, with high probability, a user s online friends in the same connected component. Hence, ensuring accessibility becomes equivalent with ensuring that, at any moment in time, we have at least one replica of each user profile within the connected component to which her friends belong. Detailed scalability evaluations. We make a detailed characterization of the behavior of such an overlay under large scale settings involving up to 1.3 million nodes, 2 million edges, and under high churn rates, which in turn confirms our scalability claims. OSN Pub-Sub P2P user publisher of her profile & subscriber node to her friends profiles user profile topic locally stored data user friends user interests node neighbors social link between two users two(logic) pub-sub links P2P link between two nodes Table 1. Mapping OSN elements to our system model elements 2. Design Overview 2.1 System Model In our design, each user runs a dedicated P2P application which stores all her social data locally. To advertise her profile updates to her friends, we organize the system as a decentralized topic-based pub-sub system. Each user has one topic to publish on, represented by her profile. This allows other users who have expressed their friendship to subscribe to this topic and receive all profile updates. A friendship linkbetweentwousersalsomeansthattheyhaveaninterest in each other. Table 1 highlights how OSN concepts are mapped onto the pub-sub system, and onto the underlying P2P system. Modeling an OSN as a pub-sub system allows one to build all key functionalities of OSNs: Social profiles, friend lists, social links. Users can enrich their social network by subscribing to other users profiles. Establishing a relationship between two users creates two symmetric pub-sub subscriptions. The corresponding links in the P2P system form a social overlay along which profile updates are propagated. Update propagation. In a topic-based pub-sub system, messages are disseminated trough logical channels (i.e., topics). The pub-sub infrastructure takes care of message distribution to all nodes interested in these topics. Hence, the pub-sub infrastructure routes a user s updates to all her friends who subscribed to her topic. Search. A pub-sub system does not provide immediate support for searching for new friends. However, the P2P overlay it creates can be used to implement this functionality, for example using an A* search algorithm through the overlay. The high clustering coefficient and low diameter of OSNs implies that most new friends were already known as friends of friends. 2.2 Architecting the Social Overlay A naive implementation could map the P2P overlay links onto the friendship links. However, such an organization is ineffective: high-degree nodes would have too many links (incurring a high maintenance cost), while low-degree ones would have not enough links (and risk to remain isolated in a dynamic environment). We address this issue using the SpiderCast protocol [7]. SpiderCast exploits the high clustering coefficient and short path lengths of a small world
3 Nodes that have common interests (friends) with you Your interests (friends & you) Friends of Friends Zone Friends Zone Network No. nodes No. edges Avg. Deg. Max. Deg. Clust. Coef. Collab. Network 18, , Filtered Facebook 1,288,842 19,311, Table 2. Datasets characteristics Figure 1. Social graph user local view You network [19] to reduce the number of connections of the overlay while allowing data to propagate efficiently from eachnodeto its subscribers(eventhoseto which it doesnot have an active connection). We defineanode slocalviewastheinformationit stores locally about the social network. This local view is composed of the IDs of all nodes with whom it shares interests: itsowndirectfriends,thefriendsofitsfriends,andthesocial relationships between them(see Figure 1). The P2P overlay is built as follows. First, each node gathers information about its 1-hop social neighborhood: its own friends as well as the friends of its friends, and the friendship links between them. In a second phase it iteratively selects nodes within this neighborhood and links to them, until each of its own OSN friends can be reached through a path in the overlay. This allows to drastically reduce the number of links per node: thanks to the high clustering coefficient, most friends are also known as the friend of a friend. Wesaythatanode sinterestiscoveredifitisrepresented in the subscription of at least one of its neighbors in the overlay [7]. In practice this means that it can receive all updates from its friends in roughly two hops(section ). The rationale is to build the overlay such that all interests of all nodes are covered. To cover its interests, each node keeps track of the interests covered by its current P2P links, and iteratively selects from its local view nodes that cover yet-uncovered interests and links to them. The selection is done by employing one of the following selection strategies: greedy strategy- selects the links that maximize the number of covered interests, or random strategy- randomly selects a node that increases the number of covered interests. Unlike SpiderCast, we do not combine the overlays obtained with each selection strategy. SpiderCast exhibits great potential to building highly scalable P2P OSNs and represents a good starting point for their design. However, there remain key issues that still need to be addressed. In particular, we need to guarantee high availability of a user s data while this user is disconnected. We address this important question in the next section. 2.3 Towards High Availability and Accessibility AnimportantaspectofP2Psystemsischurn:atanymoment oftime,asignificantfractionofusersmustbeassumedtobe offline. In the case of a P2P OSN where each user stores its own profile, this means that two friends must be online simultaneously for updates in one user s profile to become visible from the other user. Obviously, such a limitation would be unacceptable to many users. One key feature of our P2P overlay is high topic connectivity. If we assume that all topics are connected, then ensuring profile data availability and accessibility is equivalent to ensuring that, at any moment in time, at least one replica of each user profile is present within the social overlays to which its friends belong. An effective measure to ensure data availability is to proactively replicate a user s profile atanumberofnodesintheoverlay. Asimpleapproachwouldbetoreplicateauser sprofilein nodesownedbyitsfriends,orthefriendsofitsfriends.however, unpopular users may have very few friends to whom they can replicate their profile. We instead propose to fix the number of online replicas that all user profiles should have. Nodes holding a replica of a given profile ping each other periodically to detect nodes departures. Whenever one node has disconnected from the system, the oldest remaining node is in charge of creating a new replica and advertising its locationtotheothernodesholdingthesamereplica.thisnew replica is preferably chosen at a friend of the concerned user. When this is not possible, the nodeholdingthis new replica is chosen randomly in the system. As long as a node holds a replica, it also subscribes to the replica s topic. This will enable the overlay construction protocol to connect nodes holding replicas to nodes interested in this information. We expect that simple cryptographic techniques will allow to avoid disclosing personal data to the nodes chosen to hold replicas. 3. Evaluation We evaluate our P2P OSN design using trace-driven simulations. Our simulator allows us to simulate large number of nodes,andreplaythebehavioroftheentirep2p system.we evaluate our design using two real-world datasets presented in Table 2: (i) a dataset from Facebook (F.Fb.) obtained by filtering out nodes with degree 1 from one of the datasets released by [2] 1 ; and (ii) a collaboration network (C.N.) dataset[13]. 1 We filtered out all nodes with degree 1 because they were clearly overrepresented in the dataset. We speculate that this is an artifact of the sampling method used to collect this dataset.
4 PDF CDF e-5 1e-6 1e Social Overlay Node Degree Overlay Avg. = 15.3 (a) PDF Social Social Avg. = 29.9 Overlay Node Degree (b) CDF Figure 2. Node degree distribution in the F.Fb/random overlay Network Cov. Strategy Avg. Deg. Connect. C.N. greedy C.N. random F.Fb. greedy F.Fb. random Table 3. Node degrees and topic connectivity We evaluate our system in static settings(where all nodes remain connected throughout the entire simulation) and dynamic settings (with churn). In dynamic settings each live node disconnects after a time-to-live (TTL) which is randomly generated. When the TTL expires, another node, selected uniformly at random, is woken up. The simulation therefore maintains a constant fraction of online nodes (set to 3%). In all simulations, we assume that a communication event takes hundreds of milliseconds. 3.1 Scalability in Static Settings Figure 2 shows the distribution of node degrees in the P2P overlayandtheoriginalsocialgraph,inthecaseofasystem with no churn. We can see that the node degrees are significantly reduced, with the average node degree dropping from to and the maximum node degree dropping from 3593 to 683. Similar results are obtained for the Collaborative network overlay (we omit the figures due to lack of space). Despite this drastic reduction of the number of links per node, the overlay achieves very good topic connectivity. Table 3 shows that connectivity remains greater than 96% in all cases, up to 99.97% for the Facebook overlay using a random link selection strategy. This means that the reduction of number of links in the overlay does not introduce significant disruption for the good propagation of profile updates. Note thatwe donotuse replicationinthissection. Frequency [%] % 1.21% Average: % 37.73% 5.5%.45%.5% <.1% <.1% <.1% Shortest Path Length [Hops] Figure 3. Distribution of shortest paths in the F.Fb/random overlay Topic connectivity [%] Fraction of online topics [%] (a) Online topics connectivity (F.Fb/random overlay) Network 2.5 min 5 min 7.5 min 1 min Final C.N F.Fb (b) Convergence of topic-connectivity Figure 4. Connectivity in dynamic settings The path length, i.e., number of hops between two nodes, is a good metric for the cost of distributing profile updates. In a social network, most communications happen between friends. Therefore, we measure the shortest paths between pairs of friends. We sampled 2.5 million random friendship linksoutof2million.foreachpairoffriendswemeasured the shortest path length between them in the P2P overlay. Figure 3 shows the distribution of these shortest path lengths in the Facebook/random case. The average shortest path length is 2.35, with a median value of 2. Only.6% pairs of friend nodesare more than 5 hopsaway fromeach other. The overlay therefore keeps friend nodes close to each other, which allows for efficient communication between friends. 3.2 Connectivity in Dynamic Settings We now move to a system where nodes continuously join and leave the system. In this dynamic context where only 3% of nodes are online at any moment in time, keeping topics connected is much harder than in a static system which has ample opportunity to converge. Unless otherwise specified, the TTL values are randomly generated within an interval of[, 3] seconds. We first measure the connectivity level of online topics. A topic is consideredto be onlineif there is at least one online node interested in it (regardless of the current availability of the user whose profile is propagated using this topic). In this evaluation, we exploit the natural replication created by the fact that the friends of an offline node may be online and propagate the information. As such, we assume that
5 Average Node Degree Topic accessibility [%] Avg. node degrees.992 Topic-connectivity No. of Replicas (a) Replication impact on the peer-to-peer overlay (C.N./random) Avg. fraction of online topics [%] (b) Topic accessibility (C.N./random) Figure 5. Replication Performances nodes locally cache their friends most recent updates (this allows efficient implementation of OSNs key features, such as newsfeeds). However, we do not add any artificial replication yet. Figure 4(a) shows that in these difficult settings, about 6%oftheonlinetopicsarefullyconnected.Theother4% of online topics are not fully connected, but half of them still link more than 8% of their respective recipients. The average node degree is only We obtain slightly better results for the C.N. overlay thanks to its higher clustering coefficient: 8% of online topics are fully connected, with an average node degree of 4.69 (we again omit the figure duetolackofspace). Note that these results are obtained at snapshots in time, and may capture transient states, when some online topics connectivity has not yet converged. We therefore analyze the evolution of topic connectivity during the formation of the overlay in static settings. Table 4(b) shows that the topicconnectivity is converging towards a state of connectivity for almost all topics. 3.3 Replication Placing replicas at random locations in the overlay produces two simultaneous effects: it increases data accessibility, at the cost of forcing the replica node to establish a new P2P linkincaseit didn thaveasuitableonealready;whileplacing them at friends has no such effect. Figure 5(a) shows these two metrics when we vary the number of replicas per user profile in static settings and with replicas placed at random nodes. The average node degree grows roughly linearly with the numberofreplicas. Note thoughthat this is the upper bound for the average node degree, since our replication scheme first attempts to place replicas at friend nodes. The first two replicas significantly improve topic connectivity, but additional replicas do not bring any noticeable benefit. 1 Topic accessibility We now evaluate data availability when using three replicas per user profile in dynamic settings. Data is available if at a given time the user or any of her replicas is online, regardless of pub-sub connectivity. We do not consider replica failures or restrictions on nodes storage capacity. For all simulations and all snapshots, we observed 1% data availabilityforall topicswith3replicasin place. Having data available in the network does not necessarily mean it is reachable, as the node holding data may be disconnected. Figure 5(b) plots the topic accessibility, namely the ability of interested nodes to locate and fetch the data they are looking for. Replication clearly provides a significant benefit: 9% of topics are fully accessible, and the rest is generally more than 5% accessible. 4. Related Work P2P social networks. The need and opportunities to implement P2P social networks is well documented [5, 21], and has triggered a number of research efforts in this direction [6, 8, 9, 11, 16]. From the open source community, Diaspora 2 isthemostnotableexample.notallsystemshave thesamegoal:somesystemsaimtoreplicatethesamefunctionalities as those found in centralized systems while others exploit decentralization to implement new functionalities. Gossple meaningfully associates and exchanges information between users, without requiring any previous relations [4]. The focus is on finding like-minded people while preserving users anonymity. However, while Gossple connects users that exhibit a certain level of similarity, our system connects them based on pre-existing relations. PeerSoN [6], LifeSocial.KOM [11] and Pokurt [17] aim to overcome the OSN limitations by focusing on user privacy consolidation by means of encryption, access control and decentralization, while preserving OSN features. To provide reliable and replicated data storage, LifeSocial.KOM relies on PAST, while Pokurt exploits users geographical location and online time period. However, these proposals have not been evaluated in large-scale settings so it is difficult to anticipate their performance if they were deployed at a scale of millions of users. Recent proposals rely on gossiping protocols to build and maintain an overlay network whose links mirror the real social relations [9, 16]. These systems are similar to ours, butdonottrimthelinkstoreducetheaverageandmaximum node degrees. As we have seen, mapping the overlay links one-to-one on the social relationships is likely to create load imbalance and overwhelm the most popular nodes. Few proposals explicitly address scalability issues in P2P OSNs. exo focuses on query processing, assuming that a P2P overlay has already been built[15]. It therefore does not address the scalability issues at the overlay level. Additionally, issues such as profiles updates dissemination and content availability are left as future work. Google s PubSub- 2
6 Hubbub decentralized pub-sub protocol has been proposed as a solution to buildingscalable P2P OSN [12]. The protocol assumes a large number of subscribers, many publishers, and few hubs that store the social graph of the publishers and filter appropriate subscribers to push the content. However, scalability is not evaluated, relying only on scalability claims about the Google s public hub. Pub-Sub Systems. A number of scalable P2P pub-sub protocols have been proposed [7, 1, 18]. SpiderCast relies on the assumption that if, for each topic of interest, nodes connect to n randomnodesinterested in the same topic, the topic-specific overlay will be globally connected. This works wellinpracticeinthepresenceofchurnprovidedthatn 3. Inourcase,evenforn = 1,topicconnectivityremainlargely ensured thanks to the high clustering coefficient in OSNs and the use of replication techniques. Systems such as Magnet and Vitis bound the number of connections per node[1, 18]. Vitis relies on a gossip-based peer sampling service, while Magnet uses the Oscar overlay which exhibits small world properties and arranges nodes in a ring [1]. Although these systems work well for generalpurpose pub-sub application, their behavior in the specific context of OSNs remains unclear. 5. Conclusions Scalability and robustness are two often-overlooked properties in P2P online social networks. We demonstrated that the use of relatively simple techniques allows to maintain the P2P node degrees under control while ensuring good data availability and accessibility properties, even in the presence of heavy churn. This paper deliberately ignores the issue of user privacy. Many other research efforts have focused specifically on this topic. We believe security techniques are largely orthogonal to our own work but we leave the integration of both concerns for future work. Acknowledgments We would like to thank the anonymous reviewers for their feedback and suggestions. We thank Stefan Bucur and Cristian Zamfir for their help and advice. Alexandra Olteanu was partially supported by the grant Reconcile: Robust Online Credibility Evaluation of Web Content from Switzerland through the Swiss Contribution to the enlarged European Union. References [1] M. Backes, M. Maffei, and K. Pecina. A security API for distributed social networks. In Proc. NDSS, 211. [2] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna. Four degrees of separation. CoRR, abs/ , 211. [3] R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proc. SIGCOMM, 29. [4] M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, and V. Leroy. The Gossple anonymous social network. In Proc. Middleware, 21. [5] S. Buchegger and A. Datta. A case for P2P infrastructure for social networks - opportunities and challenges. In Proc. WONS, 29. [6] S.Buchegger,D.Schiöberg,L.H.Vu,andA.Datta. PeerSoN: P2P social networking - early experiences and insights. In Proc. SNS, 29. [7] G. Chockler, R. Melamed, Y. Tock, and R. Vitenberg. Spider- Cast: a scalable interest-aware overlay for topic-based pub/sub communication. In Proc. DEBS, 27. [8] L. Cutillo, R. Molva, and T. Strufe. Safebook: A privacypreserving online social network leveraging on real-life trust. Communications Magazine, IEEE, 47(12):94 11, Dec. 29. [9] A. Datta and R. Sharma. GoDisco: selective gossip based dissemination of information in social community based overlays. In Proc. ICDCN, 211. [1] S. Girdzijauskas, G. Chockler, Y. Vigfusson, Y. Tock, and R. Melamed. Magnet: practical subscription clustering for internet-scale publish/subscribe. In Proc. DEBS, 21. [11] K.Graffi,C.Gross,P.Mukherjee,A.Kovacevic,andR.Steinmetz. LifeSocial.KOM: A P2P-based platform for secure online social networks. In Proc. P2P, 21. [12] P. Kapanipathi, J. Anaya, A. Sheth, B. Slatkin, and A. Passant. Privacy-aware and scalable content dissemination in distributed social networks. In Proc. ISWC, 211. [13] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In Proc. KDD, 25. [14] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data, 1(1), Mar. 27. [15] A. Loupasakis, N. Ntarmos, and P. Triantafillou. exo: Decentralized autonomous scalable social networking. In Proc. CIDR, 211. [16] G. Mega, A. Montresor, and G. P. Picco. Efficient dissemination in decentralized social networks. In Proc. P2P, 211. [17] R. Narendula, T. G. Papaioannou, and K. Aberer. Privacyaware and highly-available OSN profiles. In Proc. WETICE, 21. [18] F. Rahimian, S. Girdzijauskas, A. H. Payberah, and S. Haridi. Vitis: A gossip-based hybrid overlay for internet-scale publish/subscribe enabling rendezvous routing in unstructured overlay networks. In Proc. IPDPS, 211. [19] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the Facebook social graph. CoRR, abs/ , 211. [2] C.Wilson,B.Boe,A.Sala,K.P.Puttaswamy,andB.Y.Zhao. User interactions in social networks and their implications. In Proc. EuroSys, 29. [21] C.-M. A. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-Lee. Decentralization: The future of online social networking. In Proc. MSNWS, 29.
Dynamic Load Balancing for Cluster-based Publish/Subscribe System
Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,
The Case of Decentralized Online Social Networks
The Case of Decentralized Online Social Networks Rammohan Narendula School of Computer and Communication Sciences, EPFL, Switzerland Abstract As the Online Social Networks (OSNs) amass unprecedented amounts
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
A Case for Dynamic Selection of Replication and Caching Strategies
A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks
Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Information Network or Social Network? The Structure of the Twitter Follow Graph
Information Network or Social Network? The Structure of the Twitter Follow Graph Seth A. Myers, Aneesh Sharma, Pankaj Gupta, and Jimmy Lin Twitter, Inc. @seth_a_myers @aneeshs @pankaj @lintool ABSTRACT
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond Bo Li Email: [email protected] Department of Computer Science and Engineering Hong Kong University of Science &
D1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
Load Balancing in Peer-to-Peer Data Networks
Load Balancing in Peer-to-Peer Data Networks David Novák Masaryk University, Brno, Czech Republic [email protected] Abstract. One of the issues considered in all Peer-to-Peer Data Networks, or Structured
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
Google+ or Google-? Dissecting the Evolution of the New OSN in its First Year
Google+ or Google-? Dissecting the Evolution of the New OSN in its First Year Roberto Gonzalez, Ruben Cuevas Universidad Carlos III de Madrid {rgonza1,rcuevas}@it.uc3m.es Reza Motamedi, Reza Rejaie University
Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging
Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of
A taxonomy of decentralized online social networks
DOI 10.1007/s12083-014-0258-2 A taxonomy of decentralized online social networks Shihabur Rahman Chowdhury Arup Raton Roy Maheen Shaikh Khuzaima Daudjee Received: 27 January 2013 / Accepted: 27 February
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Load Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Graph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems
215 IEEE International Conference on Big Data (Big Data) Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems Guoxin Liu and Haiying Shen and Haoyu Wang Department of Electrical
Social Networks and Social Media
Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich
Evaluating partitioning of big graphs
Evaluating partitioning of big graphs Fredrik Hallberg, Joakim Candefors, Micke Soderqvist [email protected], [email protected], [email protected] Royal Institute of Technology, Stockholm, Sweden Abstract. Distributed
A Framework for Scalable Global IP-Anycast (GIA)
A Framework for Scalable Global IP-Anycast (GIA) Dina Katabi, John Wroclawski MIT Laboratory for Computer Science 545 Technology Square Cambridge, MA 02139 {dina,jtw}@lcs.mit.edu ABSTRACT This paper proposes
Cassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
CitusDB Architecture for Real-Time Big Data
CitusDB Architecture for Real-Time Big Data CitusDB Highlights Empowers real-time Big Data using PostgreSQL Scales out PostgreSQL to support up to hundreds of terabytes of data Fast parallel processing
SwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
PEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
The Case for a Hybrid P2P Search Infrastructure
The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Building Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS
DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS Markus Esch, Eric Tobias - University of Luxembourg MOTIVATION HyperVerse project Massive Multiuser
