Scalable overlay Networks
|
|
- Ronald Black
- 5 years ago
- Views:
Transcription
1 overlay Networks Dr. Samu Varjonen 1
2 Lectures MO C122 Introduction. Exercises. Motivation. TH DK117 Unstructured networks I MO C122 Unstructured networks II TH DK117 Bittorrent and evaluation MO C122 Privacy (Freenet etc.) and intro to power-law networks. TH DK117 Consistent hashing. Distributed Hash Tables (DHTs) MO C122 DHTs continued TH DK117 Power-law networks MO C122 Power-law networks and applications. TH DK117 Applications I MO C122 Applications II TH DK117 Advanced topics MO C122 Conclusions and summary TH DK117 Reserved 2
3 Contents Internet Indirection Architecture (i) Error and Attack Tolerance of Complex Networks Navigability of Complex Networks Mathematics and the Internet: A Source of Enormous Confusion and Great Potential 3
4 Internet Indirection Infrastructure (I3) Ion Stoica et al Internet indirection infrastructure. In SIGCOMM '02. 4
5 Recap of Chord Distributed lookup protocol Assign a unique m-bit key (identifier) to a node Every node has predecessor and successor A key k is assigned to a node whose identifier is equal to or follows k the identifier space. Consistent hashing (of IP address) generates keys Identifiers (nodes) ordered in a circle module as 2m Given a key, map the key to a node k stored on successor(k) Routing table (at most m entries on each node) ith entry first node succeeds node by at least 2 i-1 5
6 Chord Properties Each node responsible for K/N keys K total #keys, N total #nodes When a node joins or leaves the network only O(K/N) keys will be relocated Relocation is local to the node Lookups take O(log N) messages O(log2 N) messages required to re-establish routing invariants after join/leave Each node's successor is correctly maintained For every key (k), the node responsible for k is successor(k) 6
7 Chord finger table Finger Maps to Real node 1,2,3 x+1,x+2,x+4 N14 4 x+8 N21 5 x+16 N32 6 x+32 N42 m=6 Current node at p for j=1,...,m the fingers of p+2j-1 2m-1 0 N56 N1 Predecessor node N8 N N14 N N21 N38 N
8 Chord lookup m=6 2m-1 0 N56 N1 N8 N51 N14 N42 N21 N38 N32 8
9 Recap of Chord Distributed lookup protocol Assign a unique m-bit key (identifier) to a node Every node has predecessor and successor A key k is assigned to a node whose identifier is equal to or follows k the identifier space. Consistent hashing (of IP address) generates keys Identifiers (nodes) ordered in a circle module as 2m Given a key, map the key to a node k stored on successor(k) Routing table (at most m entries on each node) ith entry first node succeeds node by at least 2 i-1 9
10 Packet's Perspective of Internet Services Unicast: One fixed source to one fixed destination Broadcast: One source to all destinations Multicast: One fixed source to multiple destinations who are part of a group Anycast: One source to exactly one destination who is a member of a group Internet Services using Unicast, Broadcast, Multicast, and Anycast are built over the point-to-point abstraction What would be another abstraction? 10
11 Rendezvous-based Communication Source sends packets to a logical identifier. Receivers express interest in packets sent to an identifier Packet is a pair (id, data) id data Receivers use triggers (id, addr) to express interest id host/object/session/ m bits Forward packet with identifier (id) to receiver with IP address (addr) Packet sent to receivers if the the interest (idt) from receiver is a longest prefix match the match is longer than matching threshold k (k < m) Abstraction decouples the act of sending from the act of receiving 11
12 API to Implement Indirection SendPacket (p) InsertTrigger(t) RemoveTrigger(t) API Implemented in an i3 Overlay Network Overlay Consists of i3 Servers Store Triggers Forward packets using IP between i3 nodes and endhosts Packets are not stored at the Servers Implemented using Chord (could be any other DHT) 12
13 R inserts a trigger (id, R) and receives all packets with identifier id. Mobility is transparent for the sender the host changes its address from R1 to R2, it updates its trigger from (id, R1) to (id, R2). Source: 13
14 A multicast tree using a hierarchy of triggers Source: 14
15 Anycast using the longest matching prefix rule. Source: 15
16 Benefits of i3 Support for mobility On moving to new address (addr'), receiver sends new trigger (id, addr') Receivers periodically refresh triggers Multicast Source is agnostic to the set of receivers Receiver agnostic to the set of sources Trigger chains can be used to minimize triggers Anycast Id contains a common prefix component and a suffix Anonymity Service Composition Stacked identifiers 16
17 Modeling Overlay Networks (contd) 17
18 Recap Milgram's Experiment Duncan Watts Random Rewiring Model Scale Free Networks (Power-Law Networks) Preferential attachment Evolving Copying Model (Copying Generative Model) Navigation in Small World Complex Networks Overlay Networks P2P 18
19 Error and Attack Tolerance of Complex Networks Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no (2000):
20 Scale-Free Model for ASGraph High Degree Nodes (Hubs) AS Topology of skitter dataset parsed by SNAP team skitter.html 20
21 Importance of Hubs (Random Graph) Albert, Réka, et al. "Error and attack tolerance of complex networks." (2000): nature 406, no
22 Error vs Attack Error (Node Failure) random node fails (malfunction) Attack Selected node with a given property is made to fail Which nodes would you target if you knew the network is a scale-free network? Nodes with the highest degree 22
23 Graph Diameter Impact of Errors and Attacks (Graph Diameter) Why? Fraction of nodes removed Changes in diameter when a small fraction f of the nodes is removed The malfunctioning (absence) of any node in general increases the distance between the remaining nodes, as it can eliminate some paths that contribute to the system's interconnectedness Albert, Réka, et al. "Error and attack tolerance of complex networks." (2000): nature 406, no
24 Graph Diameter Impact of Errors (exponential) Fraction of nodes removed The exponential network s diameter increases monotonically with f despite its redundant wiring it is increasingly difficult for the remaining nodes to communicate with each other. This behaviour is rooted in the homogeneity of the network Since all nodes have approximately the same number of links They all contribute equally to the network's diameter The removal of each node causes the same amount of damage. 24
25 Graph Diameter Impact of Errors (scale-free) Fraction of nodes removed Scale-free network the diameter remains unchanged under an increasing level of errors Even when as many as 5% of the nodes fail, the communication between the remaining nodes in the network is unaffected. This robustness of scale-free networks is rooted in their extremely inhomogeneous connectivity distribution because the power-law distribution implies that the majority of nodes have only a few links, nodes with small connectivity will be selected with much higher probability. The removal of these small nodes does not alter the path structure of the remaining nodes, and thus has no impact on the overall network topology. But the attacker would try to take out the hubs... 25
26 Graph Diameter Impact of attacks (exponential) Fraction of nodes removed Informed agent that attempts to deliberately damage a network will not eliminate the nodes randomly Attacker will preferentially target the most connected nodes. To simulate an attack the most connected nodes (degree k) are removed first and then in decreasing order Measuring the diameter of an exponential network under attack there is no substantial difference whether the nodes are selected randomly or in decreasing order of connectivity Owing to the homogeneity of the network 26
27 Graph Diameter Impact of attacks (scale-free) Fraction of nodes removed Drastically different behaviour is observed for scale-free networks When the most connected nodes are eliminated, the diameter of the scale-free network increases rapidly Doubling its original value if 5% of the nodes are removed This vulnerability to attacks is rooted in the inhomogeneity of the connectivity distribution The connectivity is maintained by a few highly connected nodes whose removal drastically alters the network's topology, and decreases the ability of the remaining nodes to communicate with each other. 27
28 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed When nodes are removed from a network Clusters of nodes whose links to the system disappear may be cut off (fragmented) from the main cluster Size of the largest cluster S Fraction f of the nodes are removed either randomly or in an attack mode average size of isolated clusters s 28
29 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed When nodes are removed from a network It was found that for the exponential network, as f increases S displays a threshold-like behaviour such that for f > fec 0.28 we have S 0 That is, all the clusters except the largest one finding that s increases rapidly until s 2 at fec Similar behaviour is observed when we monitor the average size s of the isolated clusters After which it decreases to s = 1. 29
30 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed Response of a scale-free network to attacks and failures is rather different For random failures no threshold for fragmentation is observed, instead, the size of the largest cluster slowly decreases. s 1 for most f values indicates that the nodes are breaking off one by one In contrast with the catastrophic fragmentation of the exponential network at fec, the scale-free network stays together as a large cluster for very high values of f Robust to failures Swifter degradation on attacks Scale-free networks are topological stabel under random failures and fall apart only after the main cluster has been completely deflated (error tolerance). The response to attack of the scale-free network is similar (but swifter) to the response to attack and failure of the exponential network Critical threshold fsfc 0.18, smaller than the value fec 0.28 observed for the exponential network, the system breaks apart, forming many isolated clusters. 30
31 Network Response to Attacks and Failures f=0 f 0.05 f 0.18 f 0.45 f=1 Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no (2000):
32 Critical Threshold (random node failures) m=1 Cohen's technique can be extended to errors (No closed form for fc for errors ) Cohen, Reuven et al. "Resilience of the Internet to random breakdowns." Physical review letters 85, no. 21 (2000):
33 Summary on Attack and Error Tolerance of Complex Networks Scale-free networks resilient to random failures but vulnerable to targetted attacks 33
34 Navigability of Complex Networks Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):
35 Clustering of Nodes Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):
36 Clustering of Nodes Degree-thresholding renormalization procedure: Produces a hierarchy of subgraphs within a given graph G as above For each degree threshold kt = 0, 1, 2..., First extract from G the subgraph G(k T ) induced by nodes with degrees k > kt. Second, for each node in G(kT ), Compute its internal degree ki, i.e., the number of links that connect a given node to other nodes in G(kT ) Finally, rescale ki s by the average internal degree to obtain the rescaled quantity k i/ ki(kt). ki(kt) in G(kT ) Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):
37 Clustering of Nodes Average clustering coefficient as a function of the threshold degree kt for renormalized real networks and their randomized counterparts. Internal average degree as a function of kt for the same networks. Constant clustering coeff. Average Degree Increases More similar nodes are more likely to be connected How to Generate Scale-Free Graphs with Strong Clustering? Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):
38 Generating Scale-Free Graphs with Strong Clustering Node similarity and hidden metric spaces Milgram s experiment Social networks are navigable without global information. The only information that people used to make their routing decisions in Milgram s experiment was a set of descriptive attributes of the destined recipient, such as place of living and occupation. In many networks observed in nature, including those in society and biology (signalling pathways, neural networks, etc.), nodes efficiently find intended communication targets even though they do not possess any global view of the system. 40
39 Generating Scale-Free Graphs with Strong Clustering Take all nodes and uniformly distribute them on underlying ring (hidden metric space) Assign each node its expected degree k from power-law degree distribution Connect each pair of nodes with probability r(d;k,k ) d is the distance between the nodes in the circle dc ~ kk is the characteristic distance scale Probability of link connection between nodes decreases with hidden distance between them and increases with their degree 41
40 Generating Scale-Free Graphs with Strong Clustering Hubs will be connected with a high probability because of large dc Low degree nodes connected only if d is small Hubs connected to low degree nodes at moderate distance parameter determines the hidden distance Larger the more preferred are connections between close nodes in hiddent space Pairs of high-degree nodes are connected with high propability regardles of distance Pairs of low-degree nodes are connected only if their d is close to dc 42
41 Path Length Avg. Length of Greedy Routing Paths (Greedy Routing) Network Size Exponent Path length grows polylogarithmically with the network size Paths shorter for smaller exponents and stronger clustering Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):
42 Greedy Routing Hidden Space as the coordinate space Hidden space is circle in this example Greedy Routing: Send to neighbor who is closer to the destination (in hidden space) Unsuccessful Paths: None of your neighbors are closer to the destination in the hidden space 44
43 Success Probability (Greedy Routing) P(success) increases with N when exp < 2.6 decays if exp >2.6 P(success) decays with N Weak clustering Strong clustering P(success) intertwined Maximises path success if exponent and clustering above 1.5 N = 105 Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):
44 Navigation in Scale Free Networks PGP BGP 46
45 Implications of Result Internet Routing Routers currently exchange signals to keep coherent view of network Network size increasing with time (leads to increased signal traffic) Hidden metric space eliminates the need for control signals exchanged to notify changes in network How to proceed to discover the hidden metric space Does Shortest Path imply Shortest Time to destination? What happens in case of congestion at hubs? 47
46 Mathematics and the Internet: A Source of Enormous Confusion and Great Potential W Willinger et al. Mathematics and the internet: A source of enormous confusion and great of the AMS potential. In Notices 48
47 Scale-Free Model for ASGraph AS Topology of skitter dataset parsed by SNAP team skitter.html 49
48 Is the Scale-Free Internet A Myth? What we have seen till now wrt to Preferential Attachment Preferential attachment results in Hubs Hubs vulnerable to coordinated attacks Why is the Internet still up and running Is the Scale-Free modeling paradigm consistent with the engineered nature of the Internet and the design constraints imposed by existing technology? Is the simplistic toy model too generic? Do the available measurements, their analysis, and their modeling efforts support the claims made by Error and Attack Tolerance paper? 50
49 Importance of Measurements Tool for measurement study for AS-measurements Traceroute Biases of traceroute Uses IPv4 Protocol What about non-ipv4 protocols like MPLS? What about IPv6 Entry points to non-ipv4 regions can aggregate to Hubs Only reports the interfaces traversed by the packet Routers can have multiple interfaces and appear on different routes with different IP addresses 51
50 Leverage Domain Knowledge Device Constraints What about Overlay Networks? Finite capacity of routers Placement of High Degree Nodes Finite number of interfaces on routers Edge vs Core How would you deploy the network if you are a network engineer? Leverage domain knowledge to identify driving forces behind the design of high engineered systems such as the Internet 52
51 Summary (Modeling Overlay Networks) 54
52 Recap of Modeling Overlay Networks Milgram's Experiment Duncan Watts Random Rewiring Model Scale-Free Networks Preferential attachment Evolving Copying Model (Copying Generative Model) Scale-Free with Strong Clustering Error and Fault Tolerance of Complex Networks Navigation (Greedy Routing) In Small World (Kleinberg's Small World) In Complex Networks (Scale-Free with Strong Clustering) Mathematics and the Internet: A Source of Enormous Confusion and Great Potential 55
53 Commonly used metrics Clustering Coefficient Diameter Degree Distribution 56
54 Methodology 1)Make observations (conduct measurement studies) 2)Build model to explain observations Choose the right level of granularity (zoom level) Strip the problem to a simple form Attempt to formulate the problem and model the system 3)Validate model Reproduce observations/measurements Explain observations 4)Revisit step 2 (and 1) to improve understanding 57
55 Important Articles Milgram, Stanley. "The small world problem." Psychology today 2.1 (1967): Watts, Duncan and Strogatz, Steven. "Collective dynamics of small world networks." Nature (1998): Barabási, Albert László, and Albert, Réka. "Emergence of scaling in random networks." Science 286, no (1999): Kleinberg, Jon. "The small world phenomenon: An algorithmic perspective." In ACM Symposium on Theory of computing, pp Ravi Kumar et al. "Stochastic models for the web graph." In Annual Symposium on Foundations of Computer Science, Albert, Réka, and Barabási, Albert László. "Statistical mechanics of complex networks." Reviews of modern physics 74.1 (2002): 47. Newman, Mark. "The structure and function of complex networks." SIAM review 45, no. 2 (2003): Mitzenmacher, M. (2004). "A brief history of generative models for power law and lognormal distributions." Internet mathematics, 1(2), Mark Newman. "Power laws, Pareto distributions and Zipf's law." Contemporary physics 46, no. 5 (2005): Jure Leskovec et al. "Graphs over time: densification laws, shrinking diameters and possible explanations." In ACM SIGKDD, pp Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009): W Willinger et al. Mathematics and the internet: A source of enormous confusion and great potential. In Notices of the AMS
Overlay (and P2P) Networks
Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu
More informationInternet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point
More informationarxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Aug 2000
Error and attack tolerance of complex networks arxiv:cond-mat/0008064v1 [cond-mat.dis-nn] 3 Aug 2000 Réka Albert, Hawoong Jeong, Albert-László Barabási Department of Physics, University of Notre Dame,
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks
ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web
More informationInternet Indirection Infrastructure
Motivations Internet Indirection Infrastructure Modified version of Ion Stoica s talk at ODU Nov 14, 05 Today s Internet is built around a unicast point-to-point communication abstraction: Send packet
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More information(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks
More informationCSCI5070 Advanced Topics in Social Computing
CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of
More informationM.E.J. Newman: Models of the Small World
A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is
More informationComplex Networks. Structure and Dynamics
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck
More informationInternet Indirection Infrastructure (i3)
Internet Indirection Infrastructure (i3) Ion Stoica UC Berkeley March 20, 2003 The Problem Indirection: a key technique in implementing many network services, e.g., Mobility Multicast, anycast Web caching,
More informationProperties of Biological Networks
Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási
More informationPlan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks
Plan of the lecture I. INTRODUCTION I. Networks: definitions, statistical characterization, examples II. Modeling frameworks II. DYNAMICAL PROCESSES I. Resilience, vulnerability II. Random walks III. Epidemic
More informationFailure in Complex Social Networks
Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon
More informationThe missing links in the BGP-based AS connectivity maps
The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070
More informationScalable P2P architectures
Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationPeer-to-Peer Data Management
Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation
More information6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks
, University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview
More informationApproaches for Quantifying
Approaches for Quantifying Multicast AW 2 15. 5. 2014 1 duction and Basics 2 3 4 Robustness with 5 duction Motivation High complexity leads to low predictability varies in different algorithms Long-Term
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationA Generating Function Approach to Analyze Random Graphs
A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation
More informationL3S Research Center, University of Hannover
, University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationMAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds
MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationSocial and Technological Network Analysis. Lecture 6: Network Robustness and Applica=ons. Dr. Cecilia Mascolo
Social and Technological Network Analysis Lecture 6: Network Robustness and Applica=ons Dr. Cecilia Mascolo In This Lecture We revisit power- law networks and define the concept of robustness We show the
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationNick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell
Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when
More informationUsing Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction
Using Complex Network in Wireless Sensor Networks Amit Munjal, Anurag Singh, Yatindra Nath Singh Electrical Engineering Department Indian Institute of Technology Kanpur Kanpur, India Email: {amitm, anuragsg,
More informationbeyond social networks
beyond social networks Small world phenomenon: high clustering C network >> C random graph low average shortest path l network ln( N)! neural network of C. elegans,! semantic networks of languages,! actor
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationConstructing a G(N, p) Network
Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most
More informationResilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15
Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15 Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators
More informationOssification of the Internet
Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major
More informationAdvanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationDistributed File Systems: An Overview of Peer-to-Peer Architectures. Distributed File Systems
Distributed File Systems: An Overview of Peer-to-Peer Architectures Distributed File Systems Data is distributed among many sources Ex. Distributed database systems Frequently utilize a centralized lookup
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationFlat Routing on Curved Spaces
Flat Routing on Curved Spaces Dmitri Krioukov (CAIDA/UCSD) dima@caida.org Berkeley April 19 th, 2006 Clean slate: reassess fundamental assumptions Information transmission between nodes in networks that
More informationTopics in P2P Networked Systems
600.413 Topics in P2P Networked Systems Week 3 Applications Andreas Terzis Slides from Ion Stoica, Robert Morris 600.413 Spring 2003 1 Outline What we have covered so far First generation file-sharing
More informationHow Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns
How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,
More informationNetwork Thinking. Complexity: A Guided Tour, Chapters 15-16
Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/
More informationDistributed Data Management
Distributed Data Management Christoph Lofi José Pinto Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7.0 Network Models 7.0 Introduction 7.1 Graph Model
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationCRESCENDO GEORGE S. NOMIKOS. Advisor: Dr. George Xylomenos
CRESCENDO Implementation of Hierarchical Chord (Crescendo), according to Canon paradigm and evaluation, via simulation over realistic network topologies, of the Crescendo's advantages in comparison to
More informationOverlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology
CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer
More informationHow to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?
How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).
More informationSupply chains involve complex webs of interactions among suppliers, manufacturers,
D e p e n d a b l e A g e n t S y s t e m s Survivability of Multiagent-Based Supply Networks: A Topological Perspective Hari Prasad Thadakamalla, Usha Nandini Raghavan, Soundar Kumara, and Réka Albert,
More informationRandom Generation of the Social Network with Several Communities
Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe
More informationCS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University
CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University Course website: http://snap.stanford.edu/na09 Slides will be available online Reading material will be posted online:
More informationStrategies, approaches and ethical considerations
Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationCS-E5740. Complex Networks. Scale-free networks
CS-E5740 Complex Networks Scale-free networks Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3. Growing network models: scale-free
More informationIan Clarke Oskar Sandberg
Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.
More informationConstructing a G(N, p) Network
Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,
More informationDistributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig
Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7.0 Network Models 7.0 Introduction 7.1 Graph Model Basics 7.2
More informationAttack Vulnerability of Network with Duplication-Divergence Mechanism
Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 754 758 c International Academic Publishers Vol. 48, No. 4, October 5, 2007 Attack Vulnerability of Network with Duplication-Divergence Mechanism WANG
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More information4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or
CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,
More informationPeer-to-peer networks: pioneers, self-organisation, small-world-phenomenons
Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/4/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationDistributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig
Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 6.4 Other DHTs: CAN CAN is another early DHT implementation S.
More informationExamples of Complex Networks
Examples of Complex Networks Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationPEER-TO-PEER (P2P) systems are now one of the most
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract
More informationSearching for Shared Resources: DHT in General
1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationMinimizing Churn in Distributed Systems
Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationModelling data networks research summary and modelling tools
Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at
More informationCSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena
CSE 190 Lecture 16 Data Mining and Predictive Analytics Small-world phenomena Another famous study Stanley Milgram wanted to test the (already popular) hypothesis that people in social networks are separated
More informationNDIA 19th Annual System Engineering Conference, Springfield, Virginia October 24-27, 2016
NDIA 19th Annual System Engineering Conference, Springfield, Virginia October 24-27, 2016 Caesar S. Benipayo, PhD Student Under advisement of Dr. Michael Grenn and Dr. Blake Roberts Department of Engineering
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationNetworks and stability
Networks and stability Part 1A. Network topology www.weaklink.sote.hu csermelypeter@yahoo.com Peter Csermely 1. network topology 2. network dynamics 3. examples for networks 4. synthesis (complex equilibria,
More informationNetwork Layer (Routing)
Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation
More informationSNA 8: network resilience. Lada Adamic
SNA 8: network resilience Lada Adamic Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience Q: If a given fraction
More informationLecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013
Lecture 6: Securing Distributed and Networked Systems CS 598: Network Security Matthew Caesar March 12, 2013 1 Today: Distributed Internet Services Previous cycle: how to build Internet services that run
More informationSystems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Networks II Lecture 8 Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Outline Introduction to networks Infrastructure networks Institutional
More informationInternet Indirection Infrastructure
Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele
More informationSearching for Shared Resources: DHT in General
1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 22: Overlay networks Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationRANDOM-REAL NETWORKS
RANDOM-REAL NETWORKS 1 Random networks: model A random graph is a graph of N nodes where each pair of nodes is connected by probability p: G(N,p) Random networks: model p=1/6 N=12 L=8 L=10 L=7 The number
More informationCritical Phenomena in Complex Networks
Critical Phenomena in Complex Networks Term essay for Physics 563: Phase Transitions and the Renormalization Group University of Illinois at Urbana-Champaign Vikyath Deviprasad Rao 11 May 2012 Abstract
More informationCOMMUNITY SHELL S EFFECT ON THE DISINTEGRATION OF SOCIAL NETWORKS
Annales Univ. Sci. Budapest., Sect. Comp. 43 (2014) 57 68 COMMUNITY SHELL S EFFECT ON THE DISINTEGRATION OF SOCIAL NETWORKS Imre Szücs (Budapest, Hungary) Attila Kiss (Budapest, Hungary) Dedicated to András
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule
More informationSimulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report
Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277
More informationLECT-05, S-1 FP2P, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer
More informationENTERPRISE MPLS. Kireeti Kompella
ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP
More informationDecentralized Search
Link Analysis and Decentralized Search Markus Strohmaier, Denis Helic Multimediale l Informationssysteme t II 1 The Memex (1945) The Memex [Bush 1945]: B A mechanized private library for individual use
More informationDebunking some myths about structured and unstructured overlays
Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured
More informationDistributed Information Processing
Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline
More informationSmall-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov
Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:
More information