Lesson 14 APPLICATION OF COMPLEX NETWORKS CHORD, SYMPHONY, FREENET. Laura Ricci 23/11/2015

Size: px
Start display at page:

Download "Lesson 14 APPLICATION OF COMPLEX NETWORKS CHORD, SYMPHONY, FREENET. Laura Ricci 23/11/2015"

Transcription

1 Lesson 14 APPLICATION OF COMPLEX NETWORKS CHORD, SYMPHONY, FREENET 23/11/2015 1

2 GRAPH ANALYSIS: APPLICATIONS In this lesson: exploit the tools offered by complex network analysis to analyse some properties of the P2P structured/unstructured overlays. We will consider three different applications of complex network analysis to P2P systems: topological analysis of the Chord overlay Symphony: a Kleinberg-based DHT 0.7: a Friend to Friend (F2F) or Dark network 2

3 GRAPH ANALYSIS: APPLICATIONS The overlay is described by a direct graph a vertex of the graph for each peer an edge (p,q) if p has a reference to q in its routing table a direct graph: the existence of an edge (p,q) does not imply the existence of the edge (q,p) Let us analyse the graph with the tools for the complex network analysis of last lessons: average path lengths node degree distribution indegree, outdegree, since we consider the graph as direct clustering coefficient 3

4 CHORD OVERLAY ANALYSIS Chord Ring and Finger Tables Peer: vertices an edge between p and q if p has a reference to q in its finger table 4

5 CHORD OVERLAY ANALYSIS m=28, number of bits for the identifiers n=100 edges orientation is not shown 5

6 CHORD OVERLAY ANALYSIS n=32 each vertex is connected to the opposite vertex on the ring the nodes approximatively have the same number of outgoing edges the number on ingoing edges varies considerably at different vertexes. different in/out degrees 6

7 VERTEX DEGREE DISTRIBUTION Indegree (number of ingoing edges) for a network of nodes, 28 bit identifiers can be described by an exponential curve some vertexes have an high number of ingoing edges the corresponding peers manage a high number of messages this introduces load balancing problems 7

8 VERTEX DEGREE DISTRIBUTION out-degree (number of outgoing edges) for a Chord network of nodes, 28 bit identifiers symmetric values with respect to 13.5 outdegree = numbe of entries in the finger table the same outdegree approximatively for each node 8

9 CHORD OVERLAY ANALYSIS n=32 let n be the number of identifiers on the ring, and let the metrics to measure the distance between two vertexes on the ring be: d 2n (i,j) = min{ i-j, n- i-j } each vertex is connected to the vertexes that are approximatively at distance ½ n, ¼ n,...1 9

10 CHORD: PATH AVERAGE LENGTH at each step the distance to the searched node is halved curve fitting on the experimental results the average path length grows as the logarithm of the size of the network: the diameter of the network is low. 10

11 CHORD: CLUSTERING COEFFICIENT Neighbours of 11: 14, 18, 20, 28 are linked in a sequential list Neighbours of 21: 28, 1, 9 are linked in a sequential. This property holds for the neighbours of each node.. 11

12 CHORD: CLUSTERING COEFFICIENT Theorem: Let us consider a directed graph describing the Chord overlay where an edge (a,b) exists if and only if a node a has a reference to b in its finger table. The clustering coefficient of a Chord overlay is 2/log 2 n, where n is the number of nodes in the overlay Proof: each node in the Chord ring presents the same connectivity characteristics with its neighbours (finger) hence, without loss of generality, we can consider the node v = 0 and its k (k = log(n)) neighbours 1,2,...2 k-1 let us examine two nodes neighbours of v, x = 2 i and y = 2 j, with i<j x and y are neighbour each other if and only if 2 j -2 i is a power of 2 2 j -2 i = 2 m which can be rewritten as 2 i (2 j-i -1) = 2 m for some integer m (continues in the next slide...) 12

13 CHORD: CLUSTERING COEFFICIENT Theorem: Let us consider a directed graph describing the Chord overlay where an edge (a,b) exists if and only if node a has a reference to b in its finger table. The clustering coefficient of a Chord overlay is 2/log 2 n, where n is the number of nodes in the overlay Proof: x and y are neighbours if and only if 2 j -2 i is a power of 2 2 i (2 j-i -1) = 2 m for some integer m 2 i (2 j-i -1) = 2 m if and only if 2 j-i -1 =1 therefore j=i+1 the k neighbours of v are connected in a sequential list, where each neighbour points to the neighbour defined by the next power of 2. the link are unidirectional from the lower index nodes to the higher index ones from this it follows that CC(G)= (k-1) : k(k-1)/2 = 2/k = 2/log 2 n 13

14 CHORD: CLUSTERING COEFFICIENT let us consider a Chord overlay G with n= 1024 nodes cc(g) = 2/ log 2 (1024) = 2/10 = 0.2 the clustering coefficient decreases when the number of nodes increases, but the logarithm at the denominator weakens the decrease of the value of the clustering coefficient in any case, the clustering coefficient is high with respect to a random network with the same number of nodes navigability: routing finds the routing paths through the finger tables a Chord overlay may be considered, with a good degree of approximation, a small world network 14

15 CHORD: OVERLAY ANALYSIS n=32 Property of the Chord overlay: each vertex is connected to the opposite vertex on the ring the nodes approximatively have the same number of outgoing edges the number on ingoing edges varies considerably at different vertexes. 15

16 SYMPHONY: A KLEINBERG BASED DHT Symphony: Distributed Hashing in A Small World, Manku, Bawa, Raghavan (Stanford) the structure of Symphony is similar to that of Chord: pair an identifier in the logical space to each node and each data. identifiers are assigned in the interval [0,1], in a unitary ring the nodes are inserted in this ring according to their identifier. segment of responsibility: each node is responsible of all the data identified by an ID larger or equal to its identifier (clockwise ordering) and less than or equal to the identifier of the next node but...long range links are put at random, according Kleinberg's distribution. 16

17 SYMPHONY: A KLEINBERG BASED DHT 17

18 SYMPHONY: A KLEINBERG BASED DHT Each nodes defines: a link with its predecessor and one with its successor possibly some links with close neighbours k (k 1) long distance links 18

19 SYMPHONY: A KLEINBERG BASED DHT A node defines a long range link in the following way chooses a number x according to an harmonic distribution detects the point y distant x (clockwise) with respect to itself contacts the manager of y and tries to define a long range link with y The point x is chosen according to an harmonic distribution p n (x) = 1/(x log n) The probability to put a long range link depends on the inverse of the distance (Kleinberg) and on the number of nodes 19

20 SYMPHONY: A KLEINBERG BASED DHT Harmonic probability probability distribution: n is the number of nodes in the ring x [1/n,1] is the ring distance of the target from the source of the long range link In the harmonic distribution the probability of a long range link depends on the distance and also from the number of nodes given a distance, if the number of nodes increases, the probability decreases 20

21 SYMPHONY: A KLEINBERG BASED DHT In Chord the computation of the long range links is deterministic and complex Symphony exploits a statistical approximation to obtain a similar results, but in a more efficient way lower number of messages 21

22 SYMPHONY: A KLEINBERG BASED DHT Greedy Routing Algorithm (inspired by Kleinberg): when a node n looks for a key, it sends the key through the link (short or long range) which minimizes the distance, computed clockwise, between the target and the key Theorem: consider a Symphony DHT with n nodes, where each node has k long range links. The average number of nodes which has to be contacted before reaching the node managing a key is O( log 2 n/k) If k = log n the routing requires O(log n) hops, like Chord A sort of probabilistic Chord The result is valid only for the harmonic distribution. If, we choose a uniform distribution, the complexity grows as the radix of n 22

23 SYMPHONY: A KLEINBERG BASED DHT The value K is a upper limit to the number of connections managed by each node: it may be defined at configuration time. A node chosen as target of a long range link, may refuse the connection, if it has already exceeded the limit of K opened connections In this case, the node that has required the connection (the one which wanted to define the long range link), determines a new value of x, by applying the harmonic distribution Symphony also checks that multiple links are not defined between the same pair of nodes 23

24 SYMPHONY: A KLEINBERG BASED DHT To evaluate the probability distribution, each node needs to know the total number of nodes on the overlay The computation of the exact number of nodes may be complex in a distributed setting is not simple. It may require a gossip algorithm. Symphony exploits a heuristics based on the following observation: consider s (generally 3) close distinct nodes on the ring, s << n. if the identifiers are uniformly distributed on the ring, then each node approximatively manages a segment whose length is 1/n. consider X s, the sum of the lengths of the segments of the Symphony ring, managed by the s nodes, (the length of each segment is <1) 24

25 SYMPHONY: A KLEINBERG BASED DHT Let us consider s nodes: if the distribution is uniform, each node manages approximatively a segment the same length then, the following proportion holds s:xs = n:1 where 1 is the total length of the Symphony ring this implies: n = s/xs generally, consider the predecessor, the successor node and itself if s=3 each node knows the length that it manages and the length of the segments managed by its neighbours 25

26 SYMPHONY: A KLEINBERG BASED DHT A new node joining to the ring: chooses (hash function) the identifies id in the interval [0,1] defines a contact with a bootstrap node B whose address is known detects the node that manages id, by a greedy routing connects to the close neighbours on the ring (local contacts) estimates the number of nodes on the Symphony ring through the heuristics connect to k neighbours chosen at random (remote contacts) choose a value x [0,1] according to harmonic probability distribution: P(X = x) = 1/(x *log n) where n is the number of nodes in the overlay try to define a remote connection with the node managing the point whose distance is x. the long range links are then periodically updated to face churn. 26

27 SYMPHONY: A KLEINBERG BASED DHT Voluntary leave of a node n from the ring: eliminate all the long range links for each long range link pointing to n and starting from node y, notify to y the leave of n each y must detect a new target for its long range link the neighbours of n update their short range links the estimate of the total number of nodes of the network is recomputed by each neighbour of n. 27

28 SYMPHONY: CONCLUSIONS Greedy Routing ( a la Kleinberg ): each request is routed toward the node that manages the segment closest to the key in the request Theorem: the average number of steps of the Symphony routing algorithm with k = O(1) remote connections defined by each node is inversely proportional to k and proportional to (log n) 2 28

29 FREENET: INTRODUCTION by Ian Clarke, Oskar Sandberg, et. al.: a censor-resistant, secure, adaptive, unstructured Peer-to-Peer network. a distributed storage and retrieval system we will focus on the topology aspect, not on security and anti-censorship versions 0.5 classic idea: an adaptive P2P network 0.7 new version in 2006 with new network strategy combining darknet (friend-to-friend) networks idea with smallworld graph and Kleinberg we will focus only on

30 FREENET 0.5 ROUTING AT A GLANCE 0.7 routing is based on 0.5 routing so we briefly recall this 0.5 routing: shares some characteristics with Gnutella and some with a DHT guided by the key, like for DHT bounded depth first backtrack key-based routing TTL based no flooding like Gnutella like Gnutella may return false negatives like a DHT the routing table stores pointers to GUID of other nodes each key is propagated to the node with the closest GUID 30

31 FREENET 0.5 ROUTING AT A GLANCE routing table stores pairs: content ID, node which stores that content. unique message identifiers used to detect loops (like Gnutella) depth-first search with backtracking content is cached on reply path improve subsequent access (spread popular data) improve fault tolerance by replicati 31

32 FREENET 0.5 ROUTING AT A GLANCE The request is forwarded to the node with GUID closest to the request. In case it reports failure, the 2nd best (step 4 and step 9 in example), 3rd best, etc. is chosen. Request: messages have their own message ID, so predecessor is known and loops (step 6/7 in example) can be detected. TTL (Time To Live Counter) limits the number of hops and is decremented at each hop. 32

33 FREENET 0.5 ROUTING AT A GLANCE Reply send the message with data and source locator (for connecting to nodes with close GUID data, see last slide) to the predecessor in the path. the predecessor caches the data with higher probability the closer it is to the target. anonimity: the predecessor may also alter the source (step 11 in the example, from Bob to Dave). 33

34 FREENET 0.5 ROUTING AT A GLANCE Cache Maintenance if new content arrives, delete least popular cache entries if necessary. 34

35 FREENET 0.5 ROUTING AT A GLANCE Routing tables contains pairs (keys, GUID of a node) Routing adaptively modifies the routing table: when a node knows that a key K is owned by node m it inserts the pair (m,k) in the routing table Links with new nodes are defined during the system life Content may be replicated on the way back of the queries Routing tables and content storage have limited size: exploit LRU strategy to maintain the size limited. 35

36 FRIEND TO FRIEND NETWORKS P2P networks provide decentralization and this enables to avoid the presence of a single central entity controlling the users' data decentralization is not enough to guarantee data privacy: several attacks may tamper data vulnerable to harvesting : people you don t know can easily discover whether you are part of the network a new philosophy: Friend to Friend Networks or Dark Nets: limit the connections only to trusted friends 36

37 FRIEND TO FRIEND NETWORKS Friend to Friend Networks or Dark Nets: limit the connections only to trusted friends advantage: only your trusted friends know you are part of the network disadvantage: traditional F2F networks are small with only few participants that form a closed group and thus, a closed network. may not scale to a large number of friends 37

38 FRIEND TO FRIEND NETWORKS overlay reflects social trust graph, only connections with the friends, based on trustness, topology is fixed the main reason for this is to obscure the participation of a node in the network because it is only directly visible to its friends. hidden participation (no 3rd party disclosure: hidden friendships ) compared to popular anonymous communication systems like TOR, the restriction of identity disclosure to trusted participants aims at providing additional protection against network attacks identification prosecution an intuitive solution for censorship resilient and privacy-preserving online social networks 38

39 FRIEND TO FRIEND NETWORKS communication between untrusted nodes is done indirectly via friend-tofriend links. the content injected by a user can still be stored (encrypted) on the data storage of a non friend node, but links between peers are trusted. a distributed storage system is always possible, like in 0.5 assign GUID to nodes and to content and store the content on with the closest ID...but need efficient routing which hard to achieve in such overlays because links cannot be chosen freely, but they are constrained by the trust relationshios 39

40 FREENET 0.7 Main goal: to build a global darknet no links to any other node than our predefined friends! no self adaptive algorithm for connecting to new nodes after replies. no need to propagate source to optimize graph (cluster close GUIDs) the darknet is expected to be a small-world Kleinberg-like graph. Focus on privacy AND efficiency A modified routing algorithm (different routing tables) 40

41 FREENET 0.7: BASIC IDEAS A (F2F) Darknet is essentially a social network of people trusted relationships. We know that (real) social networks have a Kleinberg behaviour (remember the Milgram experiment). People are able to find paths in the social graph: there exists a short path O(log N) between any pair of nodes Jhon Keinberg explained in 2000 how small world network can be navigable if people can rout in a social network, then it should be possible also for computers connected by F2F links, which reflect the social relationships 41

42 FREENET 0.7: BASIC IDEAS The main problem is: social routing is based on social notions which are not easily transferred in a routing algorithm. is Alice closer to Harry than Bob? in real life, people presumably use a large number of factors to decide this. Where do they live? What are their jobs? What are their interests? one cannot, in practice, expect a computer to route based on such things but remember: Kleinberg model tells us there should be a few long range connections and a many short ones. we can assign numerical identitied to peers so that this is fulfilled nodes corresponding to a community of friends should have numerically close identifiers, and communities should be connected by long range links 42

43 FREENET 0.7: BASIC IDEAS Idea: reverse engineer the node identifiers based on the friend-to-friend connection in the network Addressing and routing: in structured overlays (DHTs): choose an ID choose neighbours, according to the chosen ID in F2F overlays: nodes cannot choose neighbours, these are restricted to the friends to guarantee logarithmic routing: adapt the node ID! 43

44 THE FREENET 0.7 OVERLAY each node is assigned unique location key that is a number randomly chosen generated 0 and 1. the key values in the range 0 and 1 are to be thought of as being real numbers arranged on a circle (like the Chord ring) any arithmetic on the key values is carried out modulo 1 links between nodes correspond to friend-to-friend relations messages can only travel on these links 44

45 THE FREENET 0.7 OVERLAY under the trusted connection model, we have to assume that the graph of nodes and links between them is fixed, and cannot be optimized for routing purposes. this is a very different model from that of previous version of, and of other DHT systems that construct a graph explicitly so as to make efficient routing possible. 45

46 WHY A NEW ROUTING ALGORITHM? the darknet philosophy does not allow nodes to define connections with untrusted nodes (long range links) the routing algorithm must exploit only connections to friends Some major modifications are needed to guarantee the Kleinberg based routing (small world): the efficiency of routing depends on the structure of the fixed network. if there is no short path between two nodes, it will not be possible for a content inserted at one node to be reachable at another node in a short number of steps, regardless of how well we route. but...the graph is a subgraph of the world s social network, and this has been shown to be a small world! so, it must be possible to define an efficient routing algorithm! 46

47 FREENET 0.7: LOCATIONS SWAPPING Kleinberg s model suggests: there should be few long connections, and many short ones. we can assign numerical identities placing nodes in a circle, and do it in such a way that this is fulfilled. in other words, we reverse engineer the nodes positions based on the connections in the network. each node will have many connections to close neighbours (close with respect to the location key) linked friends will have close location keys and a set of long range links some linked friends will have far location keys then greedy route with respect to these numerical identities. 47

48 FREENET 0.7: LOCATIONS SWAPPING when nodes join the network, they choose a position on the circle randomly then nodes periodically switch position with other nodes so to minimize the product of the edges distances each connected pair of nodes (u,v) computes the ratio R between the product of the distances of u and v with their current neighbours and the distances between u and the neighbours of v and of v and the neighbours of u: if R >1 swap the location keys otherwise swap with probability R switching improves routing performance by giving close friends close identifiers some long range links are still present due to the probabilistic choice 48

49 FREENET 0.7: SWITCHING EXAMPLE 49

50 FREENET 0.7: SWITCHING EXAMPLE 50

51 AN ADVANTAGEOUS POSITIONS SWAP Red node changes its location with green node, but its neighbours do not change! 51

52 AN ADVANTAGEOUS POSITIONS SWAP Red node changes its location with green node, but its neighboursdo not change! 52

53 FREENET 0.7: LOCATIONS SWITCHING swapping location keys does not alter the physical connectivity of the network. In other words, with regard to who is whose neighbor, the network remains the same after a swap as it was before. from an operational standpoint, a major consequence of swapping the location keys is the possible migration of data objects from one node to another. data objects are stored on the basis of closeness of their hash values to the location keys at a node. so if two nodes are swapping their location keys, they would also need to swap their data objects. switching is an ongoing process as the network grows and shrinks it should be difficult to maintain permanent positions 53

54 FREENET 0.7: LOCATIONS SWITCHING Theorem [Sandberg]: The swapping action at every pair of nodes will eventually cause the location keys to converge to a state in which the routing needed for the GET and PUT requests will take only O(logN) steps with high probability. 54

55 FREENET 0.7 ROUTING similar to 0.5 routing, but no adaptivity (friend links) data identified by keys data stored at the node with the closest identifier (the closest library) depth-first routing in order of proximity to key (similar to 0.5) the request is routed to the neighbor whose location is closest to the key forwarding stops when data is found, HTL reaches zero or identical request was recently forwarded (to avoid circular routing) note that it is possible for a node to reset the HTL value to what it was originally in order to extend a path. 55

56 FREENET 0.7 GET REQUESTS Let s consider a GET request issued at F for a data object whose hash key is 0.10 with HTL equal to 2. F is only allowed to talk to D, D will receive the request with HTL=1. D has not the object there and forwards the request to G whose location key (0.73) is closest to the data key 56

57 FREENET 0.7 GET REQUESTS G does not find the data object in its store and will check the location keys at all its neighbors (not including the one from which the request was received) before responding negatively to the GET request. G discovers that B s location key is closer to the requested data key 0.10 than its own location key. So it will send the GET request to B after resetting its HTL to its original value of 2. 57

58 FREENET 0.7 GET REQUESTS The search will continue this way until HTL becomes zero and the location keys at all the neighbors are further away from the data key than the node that is the current holder of the request. At that point, the current node will either respond with the data object, if its exists in its store or will report non existence of the data object. 58

59 FREENET 0.7 GET REQUESTS note that the data object of key 0.10 is stored at node A but the search path fails to reach that node there is no theoretical guarantee that a data object will be found or that a data object will be stored at its globally best node. 59

60 FREENET 0.7 PUT REQUESTS PUT requests are routed the same as GET requests: Client initiates PUT requests Request is routed to the neighbor closest to the key If the receiver has any peer whose location is closer to the key, request is forwarded If not, the node resets the HTL to the maximum and sends the put request to all of its' neighbors Routing continues until HTL reaches zero (or node has seen request already) Once item is inserted at a node, it resends the request out to all known peers (replication) 60

61 FREENET 0.7 PUT REQUESTS 61

62 FREENET 0.7 PUT REQUESTS 62

63 FREENET 0.7 PUT REQUESTS 63

64 FREENET 0.7 PUT REQUESTS 64

65 IS FREENET 0.7 A SMALL WORLD? The definition of a small network is now more complex with respect to 0.5 no link to untrusted nodes can be extablished Basic idea: each node must have a set of short range links and some long range links since connections between nodes cannot be modified, dynamically modify the location keys of the nodes so to define a Kleinberg based overlay 65

66 APPLICATIONS BUILT ON FREENET 0.7 Freesites Frost Thaw Internal websites equivalent of WWW FProxy freesite browser jsite - Freesite creator message board/chat system feature rich, used for file sharing convenient access to FS API GUI filesharing upload/download/search Fre between users uses normal client all applications are usable ONLY on network 66

67 CONCLUSIONS structured overlays (DHTs) and semi-structured overlays: node chooses an ID then chooses its neighbours, according to the ID chosen neighbours can change: for instance connections with new neighbours can be defined during the routing of queries friends of friends overlay neighbourhood is restricted to the friends and changes only when a new trusted friends joins the network node ID may change during the computation: this is exploited to obtain logarithmic bounds 67

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

PEER-TO-PEER (P2P) systems have emerged as an appealing

PEER-TO-PEER (P2P) systems have emerged as an appealing IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,

More information

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio. Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.no Outline! Membership Management! Gossip Based Membership Protocol

More information

CS5412: TIER 2 OVERLAYS

CS5412: TIER 2 OVERLAYS 1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data

More information

The p2pweb model: a glue for the Web

The p2pweb model: a glue for the Web The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat

Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Márk Jelasity 1 and Vilmos Bilicki 2 1 University of Szeged and Hungarian Academy of Sciences, Hungary, jelasity@inf.u-szeged.hu

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Chord. A scalable peer-to-peer look-up protocol for internet applications

Chord. A scalable peer-to-peer look-up protocol for internet applications Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction

More information

query enabled P2P networks 2009. 08. 27 Park, Byunggyu

query enabled P2P networks 2009. 08. 27 Park, Byunggyu Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing

More information

Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

A Survey of Peer-to-Peer File Sharing Technologies

A Survey of Peer-to-Peer File Sharing Technologies Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

SuperViz: An Interactive Visualization of Super-Peer P2P Network

SuperViz: An Interactive Visualization of Super-Peer P2P Network SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu pqyu@cs.ubc.ca Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes

More information

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Topic Communities in P2P Networks

Topic Communities in P2P Networks Topic Communities in P2P Networks Joint work with A. Löser (IBM), C. Tempich (AIFB) SNA@ESWC 2006 Budva, Montenegro, June 12, 2006 Two opposite challenges when considering Social Networks Analysis Nodes/Agents

More information

New Structured P2P Network with Dynamic Load Balancing Scheme

New Structured P2P Network with Dynamic Load Balancing Scheme New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems Agostino Forestiero, Associate Member, IEEE, Emilio Leonardi, Senior Member, IEEE,

More information

Attacking Anonymized Social Network

Attacking Anonymized Social Network Attacking Anonymized Social Network From: Wherefore Art Thou RX3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography Presented By: Machigar Ongtang (Ongtang@cse.psu.edu ) Social

More information

Tornado: A Capability-Aware Peer-to-Peer Storage Network

Tornado: A Capability-Aware Peer-to-Peer Storage Network Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts: Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most

More information

Midterm Practice Problems

Midterm Practice Problems 6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems

MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems George Tsatsanifos (NTUA) Dimitris Sacharidis (R.C. Athena ) Timos Sellis (NTUA, R.C. Athena ) 12 th International Symposium on Spatial

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

6.02 Practice Problems: Routing

6.02 Practice Problems: Routing 1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Plaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake

Plaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake Plaxton Routing - From a peer - to - peer network point of view Lars P. Wederhake Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008 Overview 1 Introduction

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

Properties of Real Numbers

Properties of Real Numbers 16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3

Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3 Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg

More information

Content Delivery Network (CDN) and P2P Model

Content Delivery Network (CDN) and P2P Model A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Heterogeneity and Load Balance in Distributed Hash Tables

Heterogeneity and Load Balance in Distributed Hash Tables Heterogeneity and Load Balance in Distributed Hash Tables P. Brighten Godfrey and Ion Stoica Computer Science Division, University of California, Berkeley {pbg,istoica}@cs.berkeley.edu Abstract Existing

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science chord@lcs.mit.edu

More information

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu

More information

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es

p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es p2p: systems and applications Internet Avanzado, QoS, Multimedia 2006-2007 Carmen Guerrero carmen.guerrero@uc3m.es Dpto. Ingeniería Telemática Index Introduction Taxonomy Classification of p2p overlay

More information

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,

More information

5. Peer-to-peer (P2P) networks

5. Peer-to-peer (P2P) networks 5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015

More information

Attacks Against Peer-to-peer Networks and Countermeasures

Attacks Against Peer-to-peer Networks and Countermeasures Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Measuring Freenet in the Wild: Censorship-resilience under Observation

Measuring Freenet in the Wild: Censorship-resilience under Observation Measuring Freenet in the Wild: Censorship-resilience under Observation Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe Technische Universität Dresden, @tu-dresden.de

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

Architectures and protocols in Peer-to-Peer networks

Architectures and protocols in Peer-to-Peer networks Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P

More information

D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes % " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Data Management in P2P Systems: Challenges and Research Issues. Timos Sellis National Technical Univ. of Athens

Data Management in P2P Systems: Challenges and Research Issues. Timos Sellis National Technical Univ. of Athens Data Management in P2P Systems: Challenges and Research Issues Timos Sellis National Technical Univ. of Athens What is P2P? Client Server Architecture Peer-to-Peer Architecture Timos Sellis-NTUA Data Management

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

Graph Theory Problems and Solutions

Graph Theory Problems and Solutions raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

More information

Objective. Materials. TI-73 Calculator

Objective. Materials. TI-73 Calculator 0. Objective To explore subtraction of integers using a number line. Activity 2 To develop strategies for subtracting integers. Materials TI-73 Calculator Integer Subtraction What s the Difference? Teacher

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Strong and Weak Ties

Strong and Weak Ties Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014 Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, steen@cs.vu.nl Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Decentralized supplementary services for Voice-over-IP telephony

Decentralized supplementary services for Voice-over-IP telephony Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

A Comparative Study of the DNS Design with DHT-Based Alternatives

A Comparative Study of the DNS Design with DHT-Based Alternatives A Comparative Study of the DNS Design with DHT-Based Alternatives Vasileios Pappas Computer Science Department UCLA Email: vpappas@cs.ucla.edu Dan Massey Computer Science Department Colorado State University

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by

More information

HollyShare: Peer-to-Peer File Sharing Application

HollyShare: Peer-to-Peer File Sharing Application HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

4P: Performant Private Peer-to-Peer File Sharing

4P: Performant Private Peer-to-Peer File Sharing 4P: Performant Private Peer-to-Peer File Sharing Niels Zeilemaker, Johan Pouwelse, and Henk Sips Delft University of Technology, The Netherlands niels@zeilemaker.nl Abstract In recent years fully decentralized

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu

A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important

More information

Grade 7 & 8 Math Circles Circles, Circles, Circles March 19/20, 2013

Grade 7 & 8 Math Circles Circles, Circles, Circles March 19/20, 2013 Faculty of Mathematics Waterloo, Ontario N2L 3G Introduction Grade 7 & 8 Math Circles Circles, Circles, Circles March 9/20, 203 The circle is a very important shape. In fact of all shapes, the circle is

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information