Overlay and P2P Networks. On power law networks. Prof. Sasu Tarkoma

Size: px
Start display at page:

Download "Overlay and P2P Networks. On power law networks. Prof. Sasu Tarkoma"

Transcription

1 Overlay and P2P Networks On power law networks Prof. Sasu Tarkoma

2 Course Progress

3 Schedule summary Introduction. Exercises. (Exercise I published) Exercises: Reception on questions I Unstructured networks I Unstructured networks II Exercises: Answers to questions I (Exercise II published) BitTorrent, modelling and evaluation Freenet and intro to power law networks Exercises: Reception on questions II Power-law networks Consistent hashing. Distributed Hash Tables (DHTs) I 5.2. Exercises: Answers to questions II (Exercise III published) 6.2. DHTs II Applications I Exercises: Reception on questions III Applications II (also invited speakers) Conclusions and summary Exercises: Answers to questions III

4 Piece and peer selection Tit-fortat Tracker Layered Bloom Filt. Limited flooding Flooding (breadth first) Centralized components Layered Limited flooding on super nodes Location (node id) clustering Path folding (opennet) Location Swapping (Darknet) Depth first BT Gnutella Skype Freenet DHTs Random Leverages Small world Small world N/A Unstructured Structured Internet (TCP/IP)

5 Contents Zipf s law and power law distributions Robustness of networks Scale free and small worlds Search in small worlds Freenet revisited

6 Introduction Network theory has many applications Connectivity of Internet routers World Wide Web Electric grid Cellular network in biology Phone systems and phone call patterns Word co-occurrence in text Collaboration graphs and social networks The structure of the network plays a crucial role for scalability, resiliency, efficiency

7 Power-law distribution Note the difference to the Bell curve, in which most nodes have the same number of links Figure source:

8 Historical examples Pareto: income distribution, 1897 Zipf-Auerbach: city sizes, 1913/1940s Zipf-Estouf: word frequency, 1916/1940s Lotka: bibliometrics, 1926 Yule: species and genera, 1924 Mandelbrot: economics/information theory, 1950s networking community online social networks

9 On Zipf s distribution and power-laws A power-law implies that small occurrences are extremely common, whereas large instances are extremely rare This regularity or law is also referred to as Zipf or Pareto Zipf is used to model the rank distributions, and power-law for frequency distributions Examples Word popularity rank in English (Zipf) Ranking of cities by population (Zipf) Node degree distribution in a network (power-law)

10 Zipf s Law F ~ R -β, where R is the rank and the constant is close to one Straight line on a log-log plot The frequency of any word is inversely proportional to its rank. Thus most frequent word appears twice as often as the second most frequent, three times more often than the third most frequent and so on Implications for compression, text identification, statistical learning, parser implementation etc.

11 Applications The linguist George Zipf first proposed the law in 1935 in the context of word frequencies in languages. Many applications, for example size of cities, income distributions Zipf s law has been used to model Web links and media file references. It has therefore profound implications for content delivery on the Internet Large Web sites get disproportionately more traffic than smaller sites. Efficient caching relies heavily on Zipf s law to replicate a small number of immensely popular files near the users

12 InformationNetworks/lectures/ lecture3.ppt

13 Power Laws Two quantities x and y are related by a power law if y is proportional to x (-c) for a constant c y = a x (-c) The plot of log(y) versus log(x) is a straight line log(y) = -c.log(x) + log(a) The slope of the log-log plot is the power exponent c (we also use α later) Power laws in real networks: (a) WWW hyperlinks (b) co-starring in movies (c) co-authorship of physicists (d) co-authorship of neuroscientists The constant c is typically between 2 and 3

14 Scale free Power laws have the same functional form at all scales P(x) = x (-c), P(ax)= a (-c) P(x) proportional to P(x) Changes only by multiplicative factor when rescaling the independent variable x No typical scale hence scale-free

15 Power Laws in Networks Degree distribution often satisfies a power law: fraction of nodes f d of degree d is proportional to d -c Degree d Fraction f d = 1/(2d) 1 ½ (6/12) 2 ¼ (3/12) 3 1/6 (2/12) 4 ~1/8 (1/12) Source: CSE 522 Algorithmic and Economic Aspects of the Internet.

16 Internet Connections The distribution of the number of connections a host has to other hosts on the Internet has been shown to follow the power law distribution Discussion in the community, concerns with traceroute data Some nodes maintain majority of the connections (the hubs) Therefore send queries toward hubs. High-degree nodes may make the network vulnerable to attacks

17 Example: AS Connectivity Source: adamicglottometrics.pdf

18 Observations Gnutella (v0.6+) and Freenet 0.7v+ support the formation of hubs They are power law networks How robust are these networks?

19 Robustness Given a certain expected network structure, a very interesting question is how easy it is to disrupt the network and partition it into disjoint parts. Cohen et al. have analytically shown that networks in which the vertex connectivity follows a power-law distribution with an index of at most (alpha<3) are very robust in the face of random node breakdowns. where p is a probability bound on network partitioning, m is the minimum node degree, and K is the maximum node degree.

20 Robustness II The Internet node connectivity has been shown to follow a power-law distribution with alpha=2.5. Similar investigation has been made for the Gnutella P2P network resulting in the observation that alpha = 2.3 Both the Internet and Gnutella present a highly robust topology. They are able to tolerate random node breakdowns.

21 Resiliency of power-law networks

22 Gnutella Robustness For a maximum and fairly typical node degree of 20, the Gnutella overlay is partitioned into disjoint parts only when more than 60% of the nodes are down. Robustness is a highly desirable property in a network. The above equation is useful in understanding the robustness of power-law networks; however, it assumes that the node failures are random.

23 Orchestrated Attacks Although a power-law network tolerates random node failures well, it is still vulnerable to selective attacks against nodes. An orchestrated attack against hubs in the network may be very effective in partitioning the network.

24 Scale-free networks are resilient with respect to random attack Example: gnutella network, 20% of nodes removed 574 nodes in giant component 427 nodes in giant component Source: www-personal.umich.edu/~ladamic/.../ networks/.../ppt/lecture20.ppt

25 Targeted attacks are affective against scale-free networks Example: same gnutella network, 22 most connected nodes removed (2.8% of the nodes) 574 nodes in giant component 301 nodes in giant component Source: www-personal.umich.edu/~ladamic/.../ networks/.../ppt/lecture20.ppt

26 Small Worlds: Milgram s experiment The Small-World Problem Milgram (1967). How many intermediaries are needed to move a letter from person A to person B through a chain of acquaintances? Designed to find out average path length. Letter-sending experiment: starting in Nebraska/Kansas,with a target person in Boston. People forwarded the message towards the target person. Six degrees of separation.

27 Six degrees of separation Source: Wikipedia

28 Small Worlds Small-world networks are characterized by a graph degree power-law distribution Definition: A small world network is a network with a dense local structure and a diameter comparable to a random graph Also the term scale-free is used for these networks. They exhibit clustering and thus are different from random networks Most nodes have relatively few local connections to other nodes, but a significant small number of nodes have large wide-ranging sets of connections.

29 Scale-Free Networks

30 Small World Graphs The diameter of a graph is the maximum distance (number of edges) between any pair of nodes The average distance of a graph is the average distance between any pair of nodes The average connected distance of a graph is the average distance between any pair of connected nodes A graph exhibits a small world phenomenon if it has low diameter or average connected distance Typically, the average distance of a small world graph is on the order of log n (where n is the number of nodes)

31 Small Worlds and Scale Free Networks Small world phenomenon exlains why highly clustered graphs can have short average path lengths Natural and man-made structures Watts and Strogatz 1998 It does not explain why this property emerges in real networks How do power law networks emerge? Nodes connect to well-connected nodes, connectivities follows a power law

32 Watts-Strogatz model D. Watts and S. Strogatz proposed a generative model to explain small world properties Build a ring of n vertices and connect each vertex with its k clockwise neighbors on the ring Draw a random number between 0 and 1 for each edge Rewire each edge with probability p: if the edge s random number is smaller than p, keep the source vertex of the edge fixed, and choose a new target vertex uniformly at random from all other vertices k = 2 Increasing randomness p=0 p=1

33 Structured network high clustering large diameter regular Small-world network high clustering small diameter almost regular Random network small clustering small diameter Reference: Duncan J. Watts & Steven H. Strogatz, Nature 393, (1998)

34 The Copying Generative Model Proposed by R. Kumar, P. Raghavan, et al. in 2000 In each time step randomly copy one of the existing nodes keeping its links Connect the original node and the copy Randomly remove edges from both nodes with a very small probability, and give removed edge random new target nodes In this model: the probability of a node getting a new edge is proportional to its degree More edges increases probability for a neighbour being chosen

35 Barabási-Albert Model Scale-free networks with power-law node degree distribution The network grows in time No random edge generation Higher the degree, higher the probability that the new vertex will attach (preferential attachment) Generative model 1. Start with a small network (a number of nodes and edges at random) 2. At every step, add a new vertex x. Add m edges to x to existing vertices. The target is drawn with the probability given by preferential attachment (proportionally to indegree).

36 Preferential Attachment Consider dynamic Web graph Pages join one at a time Each page has one link out Let X j (t) be the number of pages of degree j at time t. New page links: With probability α, link to a random page With probability (1- α), a link to a page chosen proportionally to indegree

37 Local Clustering Coefficient v The clustering coefficient C(v) of vertex v in a directed graph is given by: the number of links between the vertices within its neighborhood divided by the number of links that could possibly exist between them v C=0 Neighbourhood is the immediately connected neighbours k(k-1) possible links for k vertices For undirected graph k(k-1)/2 possible links C=1/3 v Network average: C=3/3

38 regular Small world random L C C(p) : clustering coefficient L(p) : average path length p Reference: Duncan J. Watts & Steven H. Strogatz, Nature 393, (1998)

39 Kleinberg s result Jon Kleinberg showed that it is possible to do efficient routing on grids with the small world property. The possibility of efficient routing depends on a balance between the proportion of shortcut edges of different lengths with respect to coordinates in the base grid. The key idea is to use a frequency of edges of different lengths that decrease inverse proportionally to the length.

40 Kleinberg Small World Set of points on a n x n grid Each node only has local information Routing table creation needs to know the coordinate system Manhattan distance is used (sum of horizontal and vertical components in a grid)

41 Kleinberg s result II Results in an infinite family of small world network models on a grid with power-law distributed random long-range links K(n,k,p,q,r) p radius of neighbours to which short local links q number of random long range links k - dimension of the mesh r - clustering exponent of inverse power-law distribution. Prob.[(x,y)] dist(x,y) -r Note: Manhattan distance is used (sum of horizontal and vertical components in a grid) r determines how steeply the probability of links to far away neighbors reduces

42 Searching in the Small World Simple greedy routing: use routing table to find the link that takes the message cosest to the target Assumes that there is a way to associating nodes with points on the grid in order to find closest node

43 Search processing Node makes a greedy routing decision based on the coordinates of its local and long-range contacts the coordinates of the nodes that the message was previously routed through the coordinates of the target node. The message that needs to be delivered carries with it the target node coordinates and the coordinates of the nodes already visited nodes.

44 Example Node u is connected to all its neighbors (a, b, c, and d) and has a long-range link to some randomly chosen node v with a probablility proportional to dist(u, v) -r Just using the neighbours gives O(n) for destination If the clustering coefficient is zero, then the long range links are too random If one then there are too few random links Two would be the optimal value (links are uniformly distributed over all distances) Results in logarithmic diameter for the network

45 Constructing the graph Every node i is connected to node j within distance d Connect nodes in higher distance with probability decreasing with growing distance For every node i, additional q edges are added Probability that node j is selected is proportional to d(i,j) -r The nodes are selected by generating q random numbers based on the distribution that are distances on the graph, and then choosing a node at that distance.

46 Delivery Time in Lattice Networks For k=2, dip in time-to-search at r=2 For low r, random graph; no geographic correlation in links For high r, not a small world; no short paths to be found. Searcheability dips at r=2, in simulation Corresponds to using greedy heuristic of sending message to the node with the least lattice distance to goal Expected Delivery time = O((log n) 2 ), for r = 2 (and the special case k=r). Ω(n (2-r)/3 ), for 0 r < 2. Ω(n (r-2)/(r-1) ), for 2 < r.

47 Theorem Theorem: The routing algorithm will find short paths if and only if k = r. (k is the dimension, r is clustering exponent) The idea behind the proof is that for any r < k there are too few random edges to make the paths short. For r > k there are too many random edges, and thus too many choices to which the message could be sent. Message will make a long random walk through the network.

48 Kleinberg s result III Simple greedy routing can find routes in O(log 2 (n)) hops, where n is the size of the graph Decentralized Decisions based on local information Later work has investigated other topologies than grids (rings, ) and improving efficiency through topology information, cues, etc. Implication of result: greedy and local solution for building peer-to-peer overlay networks Note: mathematical assumptions need to hold! If they do not, efficient decentralized search is not possible.

49 Freenet Original Freenet did not take small world property into account in routing, no gurantee of the existence of an efficient decentralized search Freenet 0.7 featured the new clustering technique based on node locations How to map to Kleinberg s model?

50 Freenet Idea Assume that the network exhibit small world properties. Should be possible to recover an embedded Kleinberg small-world graph. This is accomplished by selecting random pairs of nodes and potentially swapping them based on an objective function. Function minimizes the product of all the distances between any given node and its neighbors.

51 Freenet Routing Revisited Every file is has a key (derived via a hash function) A file is stored at some node with a similar key At each peer each request is forwarded to the node in its routing table having the closest key to the requested one If the request is successful, the file is sent back via the routing nodes and each node saves the file and adds the sending node s address to its local routing table (i.e., frequently requested files are replicated) If the routing table is full, the random entry is evicted Clustering and caching for achieving the small world network benefits in routing

52 Freenet Mapping I Kleinberg s model has a base lattice (and then the random network of long-range contacts) Sandberg s Freenet routing algorithm assumes that a Freenet graph corresponds to the long-range contacts in some unknown k-dimensional Kleinberg network. If we can find the underlying base lattice, we can then determine the metric for discovering short paths Sandberg has shown that finding the unknown base grid can be cast as a problem in statistical estimation in which the lattice coordinates of the actual Freenet nodes are the parameters to be estimated.

53 Freenet Mapping II The aim of Freenet is to update node locations so that their assignment results in a small-world embedding in an imaginary base ring lattice This is realized by having the nodes examine their location keys periodically for a possible location swap Location swap does not alter the network topology, just the location identifiers! But they may swap data items. Location swap will affect future search requests.

54 Location swapping details 1. A node A randomly chooses a node B in its proximity and initiates a swap request. Both nodes share the locations of their respective neighbors and calculate D 1 (A, B). D 1 (A, B) is the product of the existing distances between A and each of A s neighbors L(a) L(n) multiplied by the product of the existing distances between B and each of B s neighbors. D 1 (A, B) = Y L(A) L(n) Y L(B) L(n) (A,n)2E (B,n)2E (1) Swap? The nodes also compute D 2 (A, B), the product of the products of the differences between their locations and their neighbors locations after a potential swap: D 2 (A, B) = Y L(B) L(n) Y L(A) L(n) (A,n)2E (B,n)2E (2) Figure 2. This figure shows an example network with two nodes considering a swap. The result of the swap equation is D 1 =.60 *.65 *.25 *.50 = and D 2 =.30 *.35 *.05 *.80 = Since D 1 >D 2, they swap. 3. If the nodes find that D 2 (A, B) apple D 1 (A, B), they swap locations, otherwise they swap locations with probability D 1(A,B) D 2 (A,B). The deterministic swap always decreases the average distances of nodes with their neighbors. The probabilistic swap is used to escape local minima. N. Evans et al. Routing in the Dark: Pitch Black

55 Is Freenet a small world? There must be a scale-free power-law distribution of links within the network. Source:

56 Applications of Small World Networks Many applications in peer-to-peer networks The Gnutella network has been observed to exhibit the clustering and short path lengths of a small world network. Its overlay dynamics lead to a biased connectivity among peers where each peer is more likely connected to peers with higher uptime The Freenet routing algorithm is built on the small world assumption Other applications in distributed hashing (DHTs) such as Symphony that uses long-range contacts drawn randomly from a family of harmonic distributions

57 Stages of power law network research (M. Mitzenmacher, 2003) There are 5 stages of power law network research. 1) Observe: Gather data to demonstrate power law behavior in a system. 2) Interpret: Explain the importance of this observation in the system context. 3) Model: Propose an underlying model for the observed behavior of the system. 4) Validate: Find data to validate (and if necessary specialize or modify) the model. 5) Control: Design ways to control and modify the underlying behavior of the system based on the model. 57

58 References Barabási, Albert-László, Linked: The New Science of Networks, ISBN M. Mitzenmacher. A brief history of generative models for power law and lognormal distributions. Internet Mathematics, mitzenmacher2003a.pdf Watts, D. J. and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature 393:440-42, D.J. Watts. Networks, Dynamics and Small-World Phenomenon, American Journal of Sociology, Vol. 105, Number 2, , M. E. J. Newman, Random graphs as models of networks, in Handbook of Graphs and Networks, S. Bornholdt and H. G. Schuster (eds.), Wiley-VCH, Berlin (2003). J. Kleinberg. The small-world phenomenon: An algorithmic perspective. Proc. 32nd ACM Symposium on Theory of Computing, 2000.

59 Terminology summary Small World network A small world network is a network with a dense local structure and a diameter comparable to a random graph Typically power-law degree distribution but can be something else as well. Power-law network A network with a power law node degree distribution Scale free network A power-law network

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

1 Six Degrees of Separation

1 Six Degrees of Separation Networks: Spring 2007 The Small-World Phenomenon David Easley and Jon Kleinberg April 23, 2007 1 Six Degrees of Separation The small-world phenomenon the principle that we are all linked by short chains

More information

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

General Network Analysis: Graph-theoretic. COMP572 Fall 2009 General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Searching in a Small World

Searching in a Small World THESIS FOR THE DEGREE OF LICENTIATE OF PHILOSOPHY Searching in a Small World Oskar Sandberg Division of Mathematical Statistics Department of Mathematical Sciences Chalmers University of Technology and

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,

More information

Network Theory: 80/20 Rule and Small Worlds Theory

Network Theory: 80/20 Rule and Small Worlds Theory Scott J. Simon / p. 1 Network Theory: 80/20 Rule and Small Worlds Theory Introduction Starting with isolated research in the early twentieth century, and following with significant gaps in research progress,

More information

The average distances in random graphs with given expected degrees

The average distances in random graphs with given expected degrees Classification: Physical Sciences, Mathematics The average distances in random graphs with given expected degrees by Fan Chung 1 and Linyuan Lu Department of Mathematics University of California at San

More information

Random graphs and complex networks

Random graphs and complex networks Random graphs and complex networks Remco van der Hofstad Honours Class, spring 2008 Complex networks Figure 2 Ye a s t p ro te in in te ra c tio n n e tw o rk. A m a p o f p ro tein p ro tein in tera c

More information

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like? What is a Network? Network/Graph Theory Network = graph Informally a graph is a set of nodes joined by a set of lines or arrows. 1 1 2 3 2 3 4 5 6 4 5 6 Graph-based representations Representing a problem

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

More information

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting

More information

Strong and Weak Ties

Strong and Weak Ties Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General

More information

Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

More information

Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems

Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems Daniel Stutzbach, Reza Rejaie University of Oregon {agthorr,reza}@cs.uoregon.edu Subhabrata Sen AT&T Labs Research sen@research.att.com

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

How To Understand The Network Of A Network

How To Understand The Network Of A Network Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each

More information

Search Heuristics for Load Balancing in IP-networks

Search Heuristics for Load Balancing in IP-networks Search Heuristics for Load Balancing in IP-networks Mattias Söderqvist Swedish Institute of Computer Science mso@sics.se 3rd March 25 SICS Technical Report T25:4 ISSN 11-3154 ISRN:SICS-T--25/4-SE Abstract

More information

The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth

The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth Cognitive Science 29 (2005) 41 78 Copyright 2005 Cognitive Science Society, Inc. All rights reserved. The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth

More information

Inet-3.0: Internet Topology Generator

Inet-3.0: Internet Topology Generator Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin {jwinick,jamin}@eecs.umich.edu CSE-TR-456-2 Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

More information

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies.. The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

Temporal Dynamics of Scale-Free Networks

Temporal Dynamics of Scale-Free Networks Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological

More information

Department of Cognitive Sciences University of California, Irvine 1

Department of Cognitive Sciences University of California, Irvine 1 Mark Steyvers Department of Cognitive Sciences University of California, Irvine 1 Network structure of word associations Decentralized search in information networks Analogy between Google and word retrieval

More information

Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat

Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Márk Jelasity 1 and Vilmos Bilicki 2 1 University of Szeged and Hungarian Academy of Sciences, Hungary, jelasity@inf.u-szeged.hu

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

B490 Mining the Big Data. 2 Clustering

B490 Mining the Big Data. 2 Clustering B490 Mining the Big Data 2 Clustering Qin Zhang 1-1 Motivations Group together similar documents/webpages/images/people/proteins/products One of the most important problems in machine learning, pattern

More information

Applying Social Network Analysis to the Information in CVS Repositories

Applying Social Network Analysis to the Information in CVS Repositories Applying Social Network Analysis to the Information in CVS Repositories Luis Lopez-Fernandez, Gregorio Robles, Jesus M. Gonzalez-Barahona GSyC, Universidad Rey Juan Carlos {llopez,grex,jgb}@gsyc.escet.urjc.es

More information

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Zipf s law and the Internet

Zipf s law and the Internet Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34 Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Bioinformatics: Network Analysis

Bioinformatics: Network Analysis Bioinformatics: Network Analysis Graph-theoretic Properties of Biological Networks COMP 572 (BIOS 572 / BIOE 564) - Fall 2013 Luay Nakhleh, Rice University 1 Outline Architectural features Motifs, modules,

More information

Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of

More information

Tutorial, IEEE SERVICE 2014 Anchorage, Alaska

Tutorial, IEEE SERVICE 2014 Anchorage, Alaska Tutorial, IEEE SERVICE 2014 Anchorage, Alaska Big Data Science: Fundamental, Techniques, and Challenges (Data Mining on Big Data) 2014. 6. 27. By Neil Y. Yen Presented by Incheon Paik University of Aizu

More information

An Incremental Super-Linear Preferential Internet Topology Model

An Incremental Super-Linear Preferential Internet Topology Model An Incremental Super-Linear Preferential Internet Topology Model Extended Abstract Sagy Bar 1, Mira Gonen 2, and Avishai Wool 3 1 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978,

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

The ebay Graph: How Do Online Auction Users Interact?

The ebay Graph: How Do Online Auction Users Interact? The ebay Graph: How Do Online Auction Users Interact? Yordanos Beyene, Michalis Faloutsos University of California, Riverside {yordanos, michalis}@cs.ucr.edu Duen Horng (Polo) Chau, Christos Faloutsos

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue. Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 16, 2015 3:23pm c 2015 Avinash Kak, Purdue University

More information

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE

More information

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat

More information

Chapter 20. The Small-World Phenomenon. 20.1 Six Degrees of Separation

Chapter 20. The Small-World Phenomenon. 20.1 Six Degrees of Separation From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS Markus Esch, Eric Tobias - University of Luxembourg MOTIVATION HyperVerse project Massive Multiuser

More information

Probabilistic Response of Interdependent Infrastructure Networks

Probabilistic Response of Interdependent Infrastructure Networks Probabilistic Response of Interdependent Infrastructure Networks Leonardo Dueñas-Osorio, James I. Craig, and Barry J. Goodno ABSTRACT Interdependent infrastructures constitute one of the most visible examples

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Graph Theory Approaches to Protein Interaction Data Analysis

Graph Theory Approaches to Protein Interaction Data Analysis Graph Theory Approaches to Protein Interaction Data Analysis Nataša Pržulj Technical Report 322/04 Department of Computer Science, University of Toronto Completed on September 8, 2003 Report issued on

More information

CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays

CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays RUNNING HEAD: [the same as the title] Spyros Voulgaris 1, Daniela Gavidia 2, Maarten van Steen 3 Contact author: Spyros Voulgaris

More information

OPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS

OPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS OPTIMIZING WEB SERVER'S DATA TRANSFER WIT OTLINKS Evangelos Kranakis School of Computer Science, Carleton University Ottaa,ON. K1S 5B6 Canada kranakis@scs.carleton.ca Danny Krizanc Department of Mathematics,

More information

arxiv:physics/0601033 v1 6 Jan 2006

arxiv:physics/0601033 v1 6 Jan 2006 Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

Cluster detection algorithm in neural networks

Cluster detection algorithm in neural networks Cluster detection algorithm in neural networks David Meunier and Hélène Paugam-Moisy Institute for Cognitive Science, UMR CNRS 5015 67, boulevard Pinel F-69675 BRON - France E-mail: {dmeunier,hpaugam}@isc.cnrs.fr

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

An Analysis of Social Network-Based Sybil Defenses

An Analysis of Social Network-Based Sybil Defenses An Analysis of Social Network-Based Sybil Defenses ABSTRACT Bimal Viswanath MPI-SWS bviswana@mpi-sws.org Krishna P. Gummadi MPI-SWS gummadi@mpi-sws.org Recently, there has been much excitement in the research

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Common Core Unit Summary Grades 6 to 8

Common Core Unit Summary Grades 6 to 8 Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations

More information

Spectrophotometry and the Beer-Lambert Law: An Important Analytical Technique in Chemistry

Spectrophotometry and the Beer-Lambert Law: An Important Analytical Technique in Chemistry Spectrophotometry and the Beer-Lambert Law: An Important Analytical Technique in Chemistry Jon H. Hardesty, PhD and Bassam Attili, PhD Collin College Department of Chemistry Introduction: In the last lab

More information

Geometry and Measurement

Geometry and Measurement The student will be able to: Geometry and Measurement 1. Demonstrate an understanding of the principles of geometry and measurement and operations using measurements Use the US system of measurement for

More information

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.

Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio. Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.no Outline! Membership Management! Gossip Based Membership Protocol

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

More information

Structure of a large social network

Structure of a large social network PHYSICAL REVIEW E 69, 036131 2004 Structure of a large social network Gábor Csányi 1, * and Balázs Szendrői 2, 1 TCM Group, Cavendish Laboratory, University of Cambridge, Madingley Road, Cambridge CB3

More information

Why Rumors Spread Fast in Social Networks

Why Rumors Spread Fast in Social Networks Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,

More information

An Efficient Strategy for Data Recovery in Wi-Fi Systems

An Efficient Strategy for Data Recovery in Wi-Fi Systems International Journal of Research & Development in Science and Technology Volume 1, Issue 2, December 2014, PP 1-6 ISSN 2350-4751 (Print) & ISSN 2350-4751(Online) An Efficient Strategy for Data Recovery

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Power Law of Predictive Graphs

Power Law of Predictive Graphs Internet Mathematics Vol. 1, No. 1: 91-114 The Average Distance in a Random Graph with Given Expected Degrees FanChungandLinyuanLu Abstract. Random graph theory is used to examine the small-world phenomenon

More information

Characterization of Latent Social Networks Discovered through Computer Network Logs

Characterization of Latent Social Networks Discovered through Computer Network Logs Characterization of Latent Social Networks Discovered through Computer Network Logs Kevin M. Carter MIT Lincoln Laboratory 244 Wood St Lexington, MA 02420 kevin.carter@ll.mit.edu Rajmonda S. Caceres MIT

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information