Overlay and P2P Networks. On power law networks. Prof. Sasu Tarkoma
|
|
- Willis Mills
- 7 years ago
- Views:
Transcription
1 Overlay and P2P Networks On power law networks Prof. Sasu Tarkoma
2 Course Progress
3 Schedule summary Introduction. Exercises. (Exercise I published) Exercises: Reception on questions I Unstructured networks I Unstructured networks II Exercises: Answers to questions I (Exercise II published) BitTorrent, modelling and evaluation Freenet and intro to power law networks Exercises: Reception on questions II Power-law networks Consistent hashing. Distributed Hash Tables (DHTs) I 5.2. Exercises: Answers to questions II (Exercise III published) 6.2. DHTs II Applications I Exercises: Reception on questions III Applications II (also invited speakers) Conclusions and summary Exercises: Answers to questions III
4 Piece and peer selection Tit-fortat Tracker Layered Bloom Filt. Limited flooding Flooding (breadth first) Centralized components Layered Limited flooding on super nodes Location (node id) clustering Path folding (opennet) Location Swapping (Darknet) Depth first BT Gnutella Skype Freenet DHTs Random Leverages Small world Small world N/A Unstructured Structured Internet (TCP/IP)
5 Contents Zipf s law and power law distributions Robustness of networks Scale free and small worlds Search in small worlds Freenet revisited
6 Introduction Network theory has many applications Connectivity of Internet routers World Wide Web Electric grid Cellular network in biology Phone systems and phone call patterns Word co-occurrence in text Collaboration graphs and social networks The structure of the network plays a crucial role for scalability, resiliency, efficiency
7 Power-law distribution Note the difference to the Bell curve, in which most nodes have the same number of links Figure source:
8 Historical examples Pareto: income distribution, 1897 Zipf-Auerbach: city sizes, 1913/1940s Zipf-Estouf: word frequency, 1916/1940s Lotka: bibliometrics, 1926 Yule: species and genera, 1924 Mandelbrot: economics/information theory, 1950s networking community online social networks
9 On Zipf s distribution and power-laws A power-law implies that small occurrences are extremely common, whereas large instances are extremely rare This regularity or law is also referred to as Zipf or Pareto Zipf is used to model the rank distributions, and power-law for frequency distributions Examples Word popularity rank in English (Zipf) Ranking of cities by population (Zipf) Node degree distribution in a network (power-law)
10 Zipf s Law F ~ R -β, where R is the rank and the constant is close to one Straight line on a log-log plot The frequency of any word is inversely proportional to its rank. Thus most frequent word appears twice as often as the second most frequent, three times more often than the third most frequent and so on Implications for compression, text identification, statistical learning, parser implementation etc.
11 Applications The linguist George Zipf first proposed the law in 1935 in the context of word frequencies in languages. Many applications, for example size of cities, income distributions Zipf s law has been used to model Web links and media file references. It has therefore profound implications for content delivery on the Internet Large Web sites get disproportionately more traffic than smaller sites. Efficient caching relies heavily on Zipf s law to replicate a small number of immensely popular files near the users
12 InformationNetworks/lectures/ lecture3.ppt
13 Power Laws Two quantities x and y are related by a power law if y is proportional to x (-c) for a constant c y = a x (-c) The plot of log(y) versus log(x) is a straight line log(y) = -c.log(x) + log(a) The slope of the log-log plot is the power exponent c (we also use α later) Power laws in real networks: (a) WWW hyperlinks (b) co-starring in movies (c) co-authorship of physicists (d) co-authorship of neuroscientists The constant c is typically between 2 and 3
14 Scale free Power laws have the same functional form at all scales P(x) = x (-c), P(ax)= a (-c) P(x) proportional to P(x) Changes only by multiplicative factor when rescaling the independent variable x No typical scale hence scale-free
15 Power Laws in Networks Degree distribution often satisfies a power law: fraction of nodes f d of degree d is proportional to d -c Degree d Fraction f d = 1/(2d) 1 ½ (6/12) 2 ¼ (3/12) 3 1/6 (2/12) 4 ~1/8 (1/12) Source: CSE 522 Algorithmic and Economic Aspects of the Internet.
16 Internet Connections The distribution of the number of connections a host has to other hosts on the Internet has been shown to follow the power law distribution Discussion in the community, concerns with traceroute data Some nodes maintain majority of the connections (the hubs) Therefore send queries toward hubs. High-degree nodes may make the network vulnerable to attacks
17 Example: AS Connectivity Source: adamicglottometrics.pdf
18 Observations Gnutella (v0.6+) and Freenet 0.7v+ support the formation of hubs They are power law networks How robust are these networks?
19 Robustness Given a certain expected network structure, a very interesting question is how easy it is to disrupt the network and partition it into disjoint parts. Cohen et al. have analytically shown that networks in which the vertex connectivity follows a power-law distribution with an index of at most (alpha<3) are very robust in the face of random node breakdowns. where p is a probability bound on network partitioning, m is the minimum node degree, and K is the maximum node degree.
20 Robustness II The Internet node connectivity has been shown to follow a power-law distribution with alpha=2.5. Similar investigation has been made for the Gnutella P2P network resulting in the observation that alpha = 2.3 Both the Internet and Gnutella present a highly robust topology. They are able to tolerate random node breakdowns.
21 Resiliency of power-law networks
22 Gnutella Robustness For a maximum and fairly typical node degree of 20, the Gnutella overlay is partitioned into disjoint parts only when more than 60% of the nodes are down. Robustness is a highly desirable property in a network. The above equation is useful in understanding the robustness of power-law networks; however, it assumes that the node failures are random.
23 Orchestrated Attacks Although a power-law network tolerates random node failures well, it is still vulnerable to selective attacks against nodes. An orchestrated attack against hubs in the network may be very effective in partitioning the network.
24 Scale-free networks are resilient with respect to random attack Example: gnutella network, 20% of nodes removed 574 nodes in giant component 427 nodes in giant component Source: www-personal.umich.edu/~ladamic/.../ networks/.../ppt/lecture20.ppt
25 Targeted attacks are affective against scale-free networks Example: same gnutella network, 22 most connected nodes removed (2.8% of the nodes) 574 nodes in giant component 301 nodes in giant component Source: www-personal.umich.edu/~ladamic/.../ networks/.../ppt/lecture20.ppt
26 Small Worlds: Milgram s experiment The Small-World Problem Milgram (1967). How many intermediaries are needed to move a letter from person A to person B through a chain of acquaintances? Designed to find out average path length. Letter-sending experiment: starting in Nebraska/Kansas,with a target person in Boston. People forwarded the message towards the target person. Six degrees of separation.
27 Six degrees of separation Source: Wikipedia
28 Small Worlds Small-world networks are characterized by a graph degree power-law distribution Definition: A small world network is a network with a dense local structure and a diameter comparable to a random graph Also the term scale-free is used for these networks. They exhibit clustering and thus are different from random networks Most nodes have relatively few local connections to other nodes, but a significant small number of nodes have large wide-ranging sets of connections.
29 Scale-Free Networks
30 Small World Graphs The diameter of a graph is the maximum distance (number of edges) between any pair of nodes The average distance of a graph is the average distance between any pair of nodes The average connected distance of a graph is the average distance between any pair of connected nodes A graph exhibits a small world phenomenon if it has low diameter or average connected distance Typically, the average distance of a small world graph is on the order of log n (where n is the number of nodes)
31 Small Worlds and Scale Free Networks Small world phenomenon exlains why highly clustered graphs can have short average path lengths Natural and man-made structures Watts and Strogatz 1998 It does not explain why this property emerges in real networks How do power law networks emerge? Nodes connect to well-connected nodes, connectivities follows a power law
32 Watts-Strogatz model D. Watts and S. Strogatz proposed a generative model to explain small world properties Build a ring of n vertices and connect each vertex with its k clockwise neighbors on the ring Draw a random number between 0 and 1 for each edge Rewire each edge with probability p: if the edge s random number is smaller than p, keep the source vertex of the edge fixed, and choose a new target vertex uniformly at random from all other vertices k = 2 Increasing randomness p=0 p=1
33 Structured network high clustering large diameter regular Small-world network high clustering small diameter almost regular Random network small clustering small diameter Reference: Duncan J. Watts & Steven H. Strogatz, Nature 393, (1998)
34 The Copying Generative Model Proposed by R. Kumar, P. Raghavan, et al. in 2000 In each time step randomly copy one of the existing nodes keeping its links Connect the original node and the copy Randomly remove edges from both nodes with a very small probability, and give removed edge random new target nodes In this model: the probability of a node getting a new edge is proportional to its degree More edges increases probability for a neighbour being chosen
35 Barabási-Albert Model Scale-free networks with power-law node degree distribution The network grows in time No random edge generation Higher the degree, higher the probability that the new vertex will attach (preferential attachment) Generative model 1. Start with a small network (a number of nodes and edges at random) 2. At every step, add a new vertex x. Add m edges to x to existing vertices. The target is drawn with the probability given by preferential attachment (proportionally to indegree).
36 Preferential Attachment Consider dynamic Web graph Pages join one at a time Each page has one link out Let X j (t) be the number of pages of degree j at time t. New page links: With probability α, link to a random page With probability (1- α), a link to a page chosen proportionally to indegree
37 Local Clustering Coefficient v The clustering coefficient C(v) of vertex v in a directed graph is given by: the number of links between the vertices within its neighborhood divided by the number of links that could possibly exist between them v C=0 Neighbourhood is the immediately connected neighbours k(k-1) possible links for k vertices For undirected graph k(k-1)/2 possible links C=1/3 v Network average: C=3/3
38 regular Small world random L C C(p) : clustering coefficient L(p) : average path length p Reference: Duncan J. Watts & Steven H. Strogatz, Nature 393, (1998)
39 Kleinberg s result Jon Kleinberg showed that it is possible to do efficient routing on grids with the small world property. The possibility of efficient routing depends on a balance between the proportion of shortcut edges of different lengths with respect to coordinates in the base grid. The key idea is to use a frequency of edges of different lengths that decrease inverse proportionally to the length.
40 Kleinberg Small World Set of points on a n x n grid Each node only has local information Routing table creation needs to know the coordinate system Manhattan distance is used (sum of horizontal and vertical components in a grid)
41 Kleinberg s result II Results in an infinite family of small world network models on a grid with power-law distributed random long-range links K(n,k,p,q,r) p radius of neighbours to which short local links q number of random long range links k - dimension of the mesh r - clustering exponent of inverse power-law distribution. Prob.[(x,y)] dist(x,y) -r Note: Manhattan distance is used (sum of horizontal and vertical components in a grid) r determines how steeply the probability of links to far away neighbors reduces
42 Searching in the Small World Simple greedy routing: use routing table to find the link that takes the message cosest to the target Assumes that there is a way to associating nodes with points on the grid in order to find closest node
43 Search processing Node makes a greedy routing decision based on the coordinates of its local and long-range contacts the coordinates of the nodes that the message was previously routed through the coordinates of the target node. The message that needs to be delivered carries with it the target node coordinates and the coordinates of the nodes already visited nodes.
44 Example Node u is connected to all its neighbors (a, b, c, and d) and has a long-range link to some randomly chosen node v with a probablility proportional to dist(u, v) -r Just using the neighbours gives O(n) for destination If the clustering coefficient is zero, then the long range links are too random If one then there are too few random links Two would be the optimal value (links are uniformly distributed over all distances) Results in logarithmic diameter for the network
45 Constructing the graph Every node i is connected to node j within distance d Connect nodes in higher distance with probability decreasing with growing distance For every node i, additional q edges are added Probability that node j is selected is proportional to d(i,j) -r The nodes are selected by generating q random numbers based on the distribution that are distances on the graph, and then choosing a node at that distance.
46 Delivery Time in Lattice Networks For k=2, dip in time-to-search at r=2 For low r, random graph; no geographic correlation in links For high r, not a small world; no short paths to be found. Searcheability dips at r=2, in simulation Corresponds to using greedy heuristic of sending message to the node with the least lattice distance to goal Expected Delivery time = O((log n) 2 ), for r = 2 (and the special case k=r). Ω(n (2-r)/3 ), for 0 r < 2. Ω(n (r-2)/(r-1) ), for 2 < r.
47 Theorem Theorem: The routing algorithm will find short paths if and only if k = r. (k is the dimension, r is clustering exponent) The idea behind the proof is that for any r < k there are too few random edges to make the paths short. For r > k there are too many random edges, and thus too many choices to which the message could be sent. Message will make a long random walk through the network.
48 Kleinberg s result III Simple greedy routing can find routes in O(log 2 (n)) hops, where n is the size of the graph Decentralized Decisions based on local information Later work has investigated other topologies than grids (rings, ) and improving efficiency through topology information, cues, etc. Implication of result: greedy and local solution for building peer-to-peer overlay networks Note: mathematical assumptions need to hold! If they do not, efficient decentralized search is not possible.
49 Freenet Original Freenet did not take small world property into account in routing, no gurantee of the existence of an efficient decentralized search Freenet 0.7 featured the new clustering technique based on node locations How to map to Kleinberg s model?
50 Freenet Idea Assume that the network exhibit small world properties. Should be possible to recover an embedded Kleinberg small-world graph. This is accomplished by selecting random pairs of nodes and potentially swapping them based on an objective function. Function minimizes the product of all the distances between any given node and its neighbors.
51 Freenet Routing Revisited Every file is has a key (derived via a hash function) A file is stored at some node with a similar key At each peer each request is forwarded to the node in its routing table having the closest key to the requested one If the request is successful, the file is sent back via the routing nodes and each node saves the file and adds the sending node s address to its local routing table (i.e., frequently requested files are replicated) If the routing table is full, the random entry is evicted Clustering and caching for achieving the small world network benefits in routing
52 Freenet Mapping I Kleinberg s model has a base lattice (and then the random network of long-range contacts) Sandberg s Freenet routing algorithm assumes that a Freenet graph corresponds to the long-range contacts in some unknown k-dimensional Kleinberg network. If we can find the underlying base lattice, we can then determine the metric for discovering short paths Sandberg has shown that finding the unknown base grid can be cast as a problem in statistical estimation in which the lattice coordinates of the actual Freenet nodes are the parameters to be estimated.
53 Freenet Mapping II The aim of Freenet is to update node locations so that their assignment results in a small-world embedding in an imaginary base ring lattice This is realized by having the nodes examine their location keys periodically for a possible location swap Location swap does not alter the network topology, just the location identifiers! But they may swap data items. Location swap will affect future search requests.
54 Location swapping details 1. A node A randomly chooses a node B in its proximity and initiates a swap request. Both nodes share the locations of their respective neighbors and calculate D 1 (A, B). D 1 (A, B) is the product of the existing distances between A and each of A s neighbors L(a) L(n) multiplied by the product of the existing distances between B and each of B s neighbors. D 1 (A, B) = Y L(A) L(n) Y L(B) L(n) (A,n)2E (B,n)2E (1) Swap? The nodes also compute D 2 (A, B), the product of the products of the differences between their locations and their neighbors locations after a potential swap: D 2 (A, B) = Y L(B) L(n) Y L(A) L(n) (A,n)2E (B,n)2E (2) Figure 2. This figure shows an example network with two nodes considering a swap. The result of the swap equation is D 1 =.60 *.65 *.25 *.50 = and D 2 =.30 *.35 *.05 *.80 = Since D 1 >D 2, they swap. 3. If the nodes find that D 2 (A, B) apple D 1 (A, B), they swap locations, otherwise they swap locations with probability D 1(A,B) D 2 (A,B). The deterministic swap always decreases the average distances of nodes with their neighbors. The probabilistic swap is used to escape local minima. N. Evans et al. Routing in the Dark: Pitch Black
55 Is Freenet a small world? There must be a scale-free power-law distribution of links within the network. Source:
56 Applications of Small World Networks Many applications in peer-to-peer networks The Gnutella network has been observed to exhibit the clustering and short path lengths of a small world network. Its overlay dynamics lead to a biased connectivity among peers where each peer is more likely connected to peers with higher uptime The Freenet routing algorithm is built on the small world assumption Other applications in distributed hashing (DHTs) such as Symphony that uses long-range contacts drawn randomly from a family of harmonic distributions
57 Stages of power law network research (M. Mitzenmacher, 2003) There are 5 stages of power law network research. 1) Observe: Gather data to demonstrate power law behavior in a system. 2) Interpret: Explain the importance of this observation in the system context. 3) Model: Propose an underlying model for the observed behavior of the system. 4) Validate: Find data to validate (and if necessary specialize or modify) the model. 5) Control: Design ways to control and modify the underlying behavior of the system based on the model. 57
58 References Barabási, Albert-László, Linked: The New Science of Networks, ISBN M. Mitzenmacher. A brief history of generative models for power law and lognormal distributions. Internet Mathematics, mitzenmacher2003a.pdf Watts, D. J. and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature 393:440-42, D.J. Watts. Networks, Dynamics and Small-World Phenomenon, American Journal of Sociology, Vol. 105, Number 2, , M. E. J. Newman, Random graphs as models of networks, in Handbook of Graphs and Networks, S. Bornholdt and H. G. Schuster (eds.), Wiley-VCH, Berlin (2003). J. Kleinberg. The small-world phenomenon: An algorithmic perspective. Proc. 32nd ACM Symposium on Theory of Computing, 2000.
59 Terminology summary Small World network A small world network is a network with a dense local structure and a diameter comparable to a random graph Typically power-law degree distribution but can be something else as well. Power-law network A network with a power law node degree distribution Scale free network A power-law network
Some questions... Graphs
Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet
More informationGraph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003
Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationA discussion of Statistical Mechanics of Complex Networks P. Part I
A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts
More information1 Six Degrees of Separation
Networks: Spring 2007 The Small-World Phenomenon David Easley and Jon Kleinberg April 23, 2007 1 Six Degrees of Separation The small-world phenomenon the principle that we are all linked by short chains
More informationGeneral Network Analysis: Graph-theoretic. COMP572 Fall 2009
General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5
More informationChapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationDmitri Krioukov CAIDA/UCSD
Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid
More informationAn Alternative Web Search Strategy? Abstract
An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on
More informationSearching in a Small World
THESIS FOR THE DEGREE OF LICENTIATE OF PHILOSOPHY Searching in a Small World Oskar Sandberg Division of Mathematical Statistics Department of Mathematical Sciences Chalmers University of Technology and
More informationGraphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
More informationComplex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
More informationGreedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
More informationMapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
More informationSmall-World Characteristics of Internet Topologies and Implications on Multicast Scaling
Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,
More informationNetwork Theory: 80/20 Rule and Small Worlds Theory
Scott J. Simon / p. 1 Network Theory: 80/20 Rule and Small Worlds Theory Introduction Starting with isolated research in the early twentieth century, and following with significant gaps in research progress,
More informationThe average distances in random graphs with given expected degrees
Classification: Physical Sciences, Mathematics The average distances in random graphs with given expected degrees by Fan Chung 1 and Linyuan Lu Department of Mathematics University of California at San
More informationRandom graphs and complex networks
Random graphs and complex networks Remco van der Hofstad Honours Class, spring 2008 Complex networks Figure 2 Ye a s t p ro te in in te ra c tio n n e tw o rk. A m a p o f p ro tein p ro tein in tera c
More informationNetwork/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?
What is a Network? Network/Graph Theory Network = graph Informally a graph is a set of nodes joined by a set of lines or arrows. 1 1 2 3 2 3 4 5 6 4 5 6 Graph-based representations Representing a problem
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationEfficient Search in Gnutella-like Small-World Peerto-Peer
Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China
More information1. Write the number of the left-hand item next to the item on the right that corresponds to it.
1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting
More informationStrong and Weak Ties
Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General
More informationSix Degrees of Separation in Online Society
Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn
More informationCharacterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems
Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems Daniel Stutzbach, Reza Rejaie University of Oregon {agthorr,reza}@cs.uoregon.edu Subhabrata Sen AT&T Labs Research sen@research.att.com
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationIntroduction to Networks and Business Intelligence
Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationHow To Understand The Network Of A Network
Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each
More informationSearch Heuristics for Load Balancing in IP-networks
Search Heuristics for Load Balancing in IP-networks Mattias Söderqvist Swedish Institute of Computer Science mso@sics.se 3rd March 25 SICS Technical Report T25:4 ISSN 11-3154 ISRN:SICS-T--25/4-SE Abstract
More informationThe Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth
Cognitive Science 29 (2005) 41 78 Copyright 2005 Cognitive Science Society, Inc. All rights reserved. The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth
More informationInet-3.0: Internet Topology Generator
Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin {jwinick,jamin}@eecs.umich.edu CSE-TR-456-2 Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet
More informationA PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
More informationGraph Mining Techniques for Social Media Analysis
Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented
More informationThe Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..
The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:
More informationTowards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
More informationTemporal Dynamics of Scale-Free Networks
Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological
More informationDepartment of Cognitive Sciences University of California, Irvine 1
Mark Steyvers Department of Cognitive Sciences University of California, Irvine 1 Network structure of word associations Decentralized search in information networks Analogy between Google and word retrieval
More informationScalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat
Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Márk Jelasity 1 and Vilmos Bilicki 2 1 University of Szeged and Hungarian Academy of Sciences, Hungary, jelasity@inf.u-szeged.hu
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationAnalyzing and modelling the AS-level Internet topology
Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More informationDistance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
More informationB490 Mining the Big Data. 2 Clustering
B490 Mining the Big Data 2 Clustering Qin Zhang 1-1 Motivations Group together similar documents/webpages/images/people/proteins/products One of the most important problems in machine learning, pattern
More informationApplying Social Network Analysis to the Information in CVS Repositories
Applying Social Network Analysis to the Information in CVS Repositories Luis Lopez-Fernandez, Gregorio Robles, Jesus M. Gonzalez-Barahona GSyC, Universidad Rey Juan Carlos {llopez,grex,jgb}@gsyc.escet.urjc.es
More informationEfficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
More informationPractical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationZipf s law and the Internet
Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationNetwork Analysis. BCH 5101: Analysis of -Omics Data 1/34
Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search
More informationSimulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationBioinformatics: Network Analysis
Bioinformatics: Network Analysis Graph-theoretic Properties of Biological Networks COMP 572 (BIOS 572 / BIOE 564) - Fall 2013 Luay Nakhleh, Rice University 1 Outline Architectural features Motifs, modules,
More informationResearch Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging
Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of
More informationTutorial, IEEE SERVICE 2014 Anchorage, Alaska
Tutorial, IEEE SERVICE 2014 Anchorage, Alaska Big Data Science: Fundamental, Techniques, and Challenges (Data Mining on Big Data) 2014. 6. 27. By Neil Y. Yen Presented by Incheon Paik University of Aizu
More informationAn Incremental Super-Linear Preferential Internet Topology Model
An Incremental Super-Linear Preferential Internet Topology Model Extended Abstract Sagy Bar 1, Mira Gonen 2, and Avishai Wool 3 1 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978,
More informationCharacterizing and Modelling Clustering Features in AS-Level Internet Topology
Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu
More informationArchitectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks
Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationSocial Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
More informationThe ebay Graph: How Do Online Auction Users Interact?
The ebay Graph: How Do Online Auction Users Interact? Yordanos Beyene, Michalis Faloutsos University of California, Riverside {yordanos, michalis}@cs.ucr.edu Duen Horng (Polo) Chau, Christos Faloutsos
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationEFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
More informationLecture 26: Small-World Peer-to-Peer Networks and Their Security Issues. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.
Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 16, 2015 3:23pm c 2015 Avinash Kak, Purdue University
More informationGENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION
International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE
More informationThe Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
More informationChapter 20. The Small-World Phenomenon. 20.1 Six Degrees of Separation
From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/
More informationA Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationProtein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationDECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS
DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS Markus Esch, Eric Tobias - University of Luxembourg MOTIVATION HyperVerse project Massive Multiuser
More informationProbabilistic Response of Interdependent Infrastructure Networks
Probabilistic Response of Interdependent Infrastructure Networks Leonardo Dueñas-Osorio, James I. Craig, and Barry J. Goodno ABSTRACT Interdependent infrastructures constitute one of the most visible examples
More informationComplex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
More informationGraph Theory Approaches to Protein Interaction Data Analysis
Graph Theory Approaches to Protein Interaction Data Analysis Nataša Pržulj Technical Report 322/04 Department of Computer Science, University of Toronto Completed on September 8, 2003 Report issued on
More informationCYCLON: Inexpensive Membership Management for Unstructured P2P Overlays
CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays RUNNING HEAD: [the same as the title] Spyros Voulgaris 1, Daniela Gavidia 2, Maarten van Steen 3 Contact author: Spyros Voulgaris
More informationOPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS
OPTIMIZING WEB SERVER'S DATA TRANSFER WIT OTLINKS Evangelos Kranakis School of Computer Science, Carleton University Ottaa,ON. K1S 5B6 Canada kranakis@scs.carleton.ca Danny Krizanc Department of Mathematics,
More informationarxiv:physics/0601033 v1 6 Jan 2006
Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationCluster detection algorithm in neural networks
Cluster detection algorithm in neural networks David Meunier and Hélène Paugam-Moisy Institute for Cognitive Science, UMR CNRS 5015 67, boulevard Pinel F-69675 BRON - France E-mail: {dmeunier,hpaugam}@isc.cnrs.fr
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationAn Analysis of Social Network-Based Sybil Defenses
An Analysis of Social Network-Based Sybil Defenses ABSTRACT Bimal Viswanath MPI-SWS bviswana@mpi-sws.org Krishna P. Gummadi MPI-SWS gummadi@mpi-sws.org Recently, there has been much excitement in the research
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationCommon Core Unit Summary Grades 6 to 8
Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations
More informationSpectrophotometry and the Beer-Lambert Law: An Important Analytical Technique in Chemistry
Spectrophotometry and the Beer-Lambert Law: An Important Analytical Technique in Chemistry Jon H. Hardesty, PhD and Bassam Attili, PhD Collin College Department of Chemistry Introduction: In the last lab
More informationGeometry and Measurement
The student will be able to: Geometry and Measurement 1. Demonstrate an understanding of the principles of geometry and measurement and operations using measurements Use the US system of measurement for
More informationScalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.
Scalable Membership Management and Failure Detection (Dependability) INF5360 Student Presentation by Morten Lindeberg mglindeb@ifi.uio.no Outline! Membership Management! Gossip Based Membership Protocol
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationUnderstanding the evolution dynamics of internet topology
Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript
More informationStructure of a large social network
PHYSICAL REVIEW E 69, 036131 2004 Structure of a large social network Gábor Csányi 1, * and Balázs Szendrői 2, 1 TCM Group, Cavendish Laboratory, University of Cambridge, Madingley Road, Cambridge CB3
More informationWhy Rumors Spread Fast in Social Networks
Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,
More informationAn Efficient Strategy for Data Recovery in Wi-Fi Systems
International Journal of Research & Development in Science and Technology Volume 1, Issue 2, December 2014, PP 1-6 ISSN 2350-4751 (Print) & ISSN 2350-4751(Online) An Efficient Strategy for Data Recovery
More informationGraph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationPower Law of Predictive Graphs
Internet Mathematics Vol. 1, No. 1: 91-114 The Average Distance in a Random Graph with Given Expected Degrees FanChungandLinyuanLu Abstract. Random graph theory is used to examine the small-world phenomenon
More informationCharacterization of Latent Social Networks Discovered through Computer Network Logs
Characterization of Latent Social Networks Discovered through Computer Network Logs Kevin M. Carter MIT Lincoln Laboratory 244 Wood St Lexington, MA 02420 kevin.carter@ll.mit.edu Rajmonda S. Caceres MIT
More informationLoad Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
More information