Scalable overlay Networks

Size: px
Start display at page:

Download "Scalable overlay Networks"

Transcription

1 overlay Networks Dr. Samu Varjonen 1

2 Lectures MO C122 Introduction. Exercises. Motivation. TH DK117 Unstructured networks I MO C122 Unstructured networks II TH DK117 Bittorrent and evaluation MO C122 Privacy (Freenet etc.) and intro to power-law networks. TH DK117 Consistent hashing. Distributed Hash Tables (DHTs) MO C122 DHTs continued TH DK117 Power-law networks MO C122 Power-law networks and applications. TH DK117 Applications I MO C122 Applications II TH DK117 Advanced topics MO C122 Conclusions and summary TH DK117 Reserved 2

3 Contents Internet Indirection Architecture (i) Error and Attack Tolerance of Complex Networks Navigability of Complex Networks Mathematics and the Internet: A Source of Enormous Confusion and Great Potential 3

4 Internet Indirection Infrastructure (I3) Ion Stoica et al Internet indirection infrastructure. In SIGCOMM '02. 4

5 Recap of Chord Distributed lookup protocol Assign a unique m-bit key (identifier) to a node Every node has predecessor and successor A key k is assigned to a node whose identifier is equal to or follows k the identifier space. Consistent hashing (of IP address) generates keys Identifiers (nodes) ordered in a circle module as 2m Given a key, map the key to a node k stored on successor(k) Routing table (at most m entries on each node) ith entry first node succeeds node by at least 2 i-1 5

6 Chord Properties Each node responsible for K/N keys K total #keys, N total #nodes When a node joins or leaves the network only O(K/N) keys will be relocated Relocation is local to the node Lookups take O(log N) messages O(log2 N) messages required to re-establish routing invariants after join/leave Each node's successor is correctly maintained For every key (k), the node responsible for k is successor(k) 6

7 Chord finger table Finger Maps to Real node 1,2,3 x+1,x+2,x+4 N14 4 x+8 N21 5 x+16 N32 6 x+32 N42 m=6 Current node at p for j=1,...,m the fingers of p+2j-1 2m-1 0 N56 N1 Predecessor node N8 N N14 N N21 N38 N

8 Chord lookup m=6 2m-1 0 N56 N1 N8 N51 N14 N42 N21 N38 N32 8

9 Recap of Chord Distributed lookup protocol Assign a unique m-bit key (identifier) to a node Every node has predecessor and successor A key k is assigned to a node whose identifier is equal to or follows k the identifier space. Consistent hashing (of IP address) generates keys Identifiers (nodes) ordered in a circle module as 2m Given a key, map the key to a node k stored on successor(k) Routing table (at most m entries on each node) ith entry first node succeeds node by at least 2 i-1 9

10 Packet's Perspective of Internet Services Unicast: One fixed source to one fixed destination Broadcast: One source to all destinations Multicast: One fixed source to multiple destinations who are part of a group Anycast: One source to exactly one destination who is a member of a group Internet Services using Unicast, Broadcast, Multicast, and Anycast are built over the point-to-point abstraction What would be another abstraction? 10

11 Rendezvous-based Communication Source sends packets to a logical identifier. Receivers express interest in packets sent to an identifier Packet is a pair (id, data) id data Receivers use triggers (id, addr) to express interest id host/object/session/ m bits Forward packet with identifier (id) to receiver with IP address (addr) Packet sent to receivers if the the interest (idt) from receiver is a longest prefix match the match is longer than matching threshold k (k < m) Abstraction decouples the act of sending from the act of receiving 11

12 API to Implement Indirection SendPacket (p) InsertTrigger(t) RemoveTrigger(t) API Implemented in an i3 Overlay Network Overlay Consists of i3 Servers Store Triggers Forward packets using IP between i3 nodes and endhosts Packets are not stored at the Servers Implemented using Chord (could be any other DHT) 12

13 R inserts a trigger (id, R) and receives all packets with identifier id. Mobility is transparent for the sender the host changes its address from R1 to R2, it updates its trigger from (id, R1) to (id, R2). Source: 13

14 A multicast tree using a hierarchy of triggers Source: 14

15 Anycast using the longest matching prefix rule. Source: 15

16 Benefits of i3 Support for mobility On moving to new address (addr'), receiver sends new trigger (id, addr') Receivers periodically refresh triggers Multicast Source is agnostic to the set of receivers Receiver agnostic to the set of sources Trigger chains can be used to minimize triggers Anycast Id contains a common prefix component and a suffix Anonymity Service Composition Stacked identifiers 16

17 Modeling Overlay Networks (contd) 17

18 Recap Milgram's Experiment Duncan Watts Random Rewiring Model Scale Free Networks (Power-Law Networks) Preferential attachment Evolving Copying Model (Copying Generative Model) Navigation in Small World Complex Networks Overlay Networks P2P 18

19 Error and Attack Tolerance of Complex Networks Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no (2000):

20 Scale-Free Model for ASGraph High Degree Nodes (Hubs) AS Topology of skitter dataset parsed by SNAP team skitter.html 20

21 Importance of Hubs (Random Graph) Albert, Réka, et al. "Error and attack tolerance of complex networks." (2000): nature 406, no

22 Error vs Attack Error (Node Failure) random node fails (malfunction) Attack Selected node with a given property is made to fail Which nodes would you target if you knew the network is a scale-free network? Nodes with the highest degree 22

23 Graph Diameter Impact of Errors and Attacks (Graph Diameter) Why? Fraction of nodes removed Changes in diameter when a small fraction f of the nodes is removed The malfunctioning (absence) of any node in general increases the distance between the remaining nodes, as it can eliminate some paths that contribute to the system's interconnectedness Albert, Réka, et al. "Error and attack tolerance of complex networks." (2000): nature 406, no

24 Graph Diameter Impact of Errors (exponential) Fraction of nodes removed The exponential network s diameter increases monotonically with f despite its redundant wiring it is increasingly difficult for the remaining nodes to communicate with each other. This behaviour is rooted in the homogeneity of the network Since all nodes have approximately the same number of links They all contribute equally to the network's diameter The removal of each node causes the same amount of damage. 24

25 Graph Diameter Impact of Errors (scale-free) Fraction of nodes removed Scale-free network the diameter remains unchanged under an increasing level of errors Even when as many as 5% of the nodes fail, the communication between the remaining nodes in the network is unaffected. This robustness of scale-free networks is rooted in their extremely inhomogeneous connectivity distribution because the power-law distribution implies that the majority of nodes have only a few links, nodes with small connectivity will be selected with much higher probability. The removal of these small nodes does not alter the path structure of the remaining nodes, and thus has no impact on the overall network topology. But the attacker would try to take out the hubs... 25

26 Graph Diameter Impact of attacks (exponential) Fraction of nodes removed Informed agent that attempts to deliberately damage a network will not eliminate the nodes randomly Attacker will preferentially target the most connected nodes. To simulate an attack the most connected nodes (degree k) are removed first and then in decreasing order Measuring the diameter of an exponential network under attack there is no substantial difference whether the nodes are selected randomly or in decreasing order of connectivity Owing to the homogeneity of the network 26

27 Graph Diameter Impact of attacks (scale-free) Fraction of nodes removed Drastically different behaviour is observed for scale-free networks When the most connected nodes are eliminated, the diameter of the scale-free network increases rapidly Doubling its original value if 5% of the nodes are removed This vulnerability to attacks is rooted in the inhomogeneity of the connectivity distribution The connectivity is maintained by a few highly connected nodes whose removal drastically alters the network's topology, and decreases the ability of the remaining nodes to communicate with each other. 27

28 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed When nodes are removed from a network Clusters of nodes whose links to the system disappear may be cut off (fragmented) from the main cluster Size of the largest cluster S Fraction f of the nodes are removed either randomly or in an attack mode average size of isolated clusters s 28

29 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed When nodes are removed from a network It was found that for the exponential network, as f increases S displays a threshold-like behaviour such that for f > fec 0.28 we have S 0 That is, all the clusters except the largest one finding that s increases rapidly until s 2 at fec Similar behaviour is observed when we monitor the average size s of the isolated clusters After which it decreases to s = 1. 29

30 Relative <s> and S Impact of Errors and Attacks (Size of Largest Cluster) Fraction of nodes removed Response of a scale-free network to attacks and failures is rather different For random failures no threshold for fragmentation is observed, instead, the size of the largest cluster slowly decreases. s 1 for most f values indicates that the nodes are breaking off one by one In contrast with the catastrophic fragmentation of the exponential network at fec, the scale-free network stays together as a large cluster for very high values of f Robust to failures Swifter degradation on attacks Scale-free networks are topological stabel under random failures and fall apart only after the main cluster has been completely deflated (error tolerance). The response to attack of the scale-free network is similar (but swifter) to the response to attack and failure of the exponential network Critical threshold fsfc 0.18, smaller than the value fec 0.28 observed for the exponential network, the system breaks apart, forming many isolated clusters. 30

31 Network Response to Attacks and Failures f=0 f 0.05 f 0.18 f 0.45 f=1 Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no (2000):

32 Critical Threshold (random node failures) m=1 Cohen's technique can be extended to errors (No closed form for fc for errors ) Cohen, Reuven et al. "Resilience of the Internet to random breakdowns." Physical review letters 85, no. 21 (2000):

33 Summary on Attack and Error Tolerance of Complex Networks Scale-free networks resilient to random failures but vulnerable to targetted attacks 33

34 Navigability of Complex Networks Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):

35 Clustering of Nodes Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):

36 Clustering of Nodes Degree-thresholding renormalization procedure: Produces a hierarchy of subgraphs within a given graph G as above For each degree threshold kt = 0, 1, 2..., First extract from G the subgraph G(k T ) induced by nodes with degrees k > kt. Second, for each node in G(kT ), Compute its internal degree ki, i.e., the number of links that connect a given node to other nodes in G(kT ) Finally, rescale ki s by the average internal degree to obtain the rescaled quantity k i/ ki(kt). ki(kt) in G(kT ) Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):

37 Clustering of Nodes Average clustering coefficient as a function of the threshold degree kt for renormalized real networks and their randomized counterparts. Internal average degree as a function of kt for the same networks. Constant clustering coeff. Average Degree Increases More similar nodes are more likely to be connected How to Generate Scale-Free Graphs with Strong Clustering? Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008):

38 Generating Scale-Free Graphs with Strong Clustering Node similarity and hidden metric spaces Milgram s experiment Social networks are navigable without global information. The only information that people used to make their routing decisions in Milgram s experiment was a set of descriptive attributes of the destined recipient, such as place of living and occupation. In many networks observed in nature, including those in society and biology (signalling pathways, neural networks, etc.), nodes efficiently find intended communication targets even though they do not possess any global view of the system. 40

39 Generating Scale-Free Graphs with Strong Clustering Take all nodes and uniformly distribute them on underlying ring (hidden metric space) Assign each node its expected degree k from power-law degree distribution Connect each pair of nodes with probability r(d;k,k ) d is the distance between the nodes in the circle dc ~ kk is the characteristic distance scale Probability of link connection between nodes decreases with hidden distance between them and increases with their degree 41

40 Generating Scale-Free Graphs with Strong Clustering Hubs will be connected with a high probability because of large dc Low degree nodes connected only if d is small Hubs connected to low degree nodes at moderate distance parameter determines the hidden distance Larger the more preferred are connections between close nodes in hiddent space Pairs of high-degree nodes are connected with high propability regardles of distance Pairs of low-degree nodes are connected only if their d is close to dc 42

41 Path Length Avg. Length of Greedy Routing Paths (Greedy Routing) Network Size Exponent Path length grows polylogarithmically with the network size Paths shorter for smaller exponents and stronger clustering Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):

42 Greedy Routing Hidden Space as the coordinate space Hidden space is circle in this example Greedy Routing: Send to neighbor who is closer to the destination (in hidden space) Unsuccessful Paths: None of your neighbors are closer to the destination in the hidden space 44

43 Success Probability (Greedy Routing) P(success) increases with N when exp < 2.6 decays if exp >2.6 P(success) decays with N Weak clustering Strong clustering P(success) intertwined Maximises path success if exponent and clustering above 1.5 N = 105 Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009):

44 Navigation in Scale Free Networks PGP BGP 46

45 Implications of Result Internet Routing Routers currently exchange signals to keep coherent view of network Network size increasing with time (leads to increased signal traffic) Hidden metric space eliminates the need for control signals exchanged to notify changes in network How to proceed to discover the hidden metric space Does Shortest Path imply Shortest Time to destination? What happens in case of congestion at hubs? 47

46 Mathematics and the Internet: A Source of Enormous Confusion and Great Potential W Willinger et al. Mathematics and the internet: A source of enormous confusion and great of the AMS potential. In Notices 48

47 Scale-Free Model for ASGraph AS Topology of skitter dataset parsed by SNAP team skitter.html 49

48 Is the Scale-Free Internet A Myth? What we have seen till now wrt to Preferential Attachment Preferential attachment results in Hubs Hubs vulnerable to coordinated attacks Why is the Internet still up and running Is the Scale-Free modeling paradigm consistent with the engineered nature of the Internet and the design constraints imposed by existing technology? Is the simplistic toy model too generic? Do the available measurements, their analysis, and their modeling efforts support the claims made by Error and Attack Tolerance paper? 50

49 Importance of Measurements Tool for measurement study for AS-measurements Traceroute Biases of traceroute Uses IPv4 Protocol What about non-ipv4 protocols like MPLS? What about IPv6 Entry points to non-ipv4 regions can aggregate to Hubs Only reports the interfaces traversed by the packet Routers can have multiple interfaces and appear on different routes with different IP addresses 51

50 Leverage Domain Knowledge Device Constraints What about Overlay Networks? Finite capacity of routers Placement of High Degree Nodes Finite number of interfaces on routers Edge vs Core How would you deploy the network if you are a network engineer? Leverage domain knowledge to identify driving forces behind the design of high engineered systems such as the Internet 52

51 Summary (Modeling Overlay Networks) 54

52 Recap of Modeling Overlay Networks Milgram's Experiment Duncan Watts Random Rewiring Model Scale-Free Networks Preferential attachment Evolving Copying Model (Copying Generative Model) Scale-Free with Strong Clustering Error and Fault Tolerance of Complex Networks Navigation (Greedy Routing) In Small World (Kleinberg's Small World) In Complex Networks (Scale-Free with Strong Clustering) Mathematics and the Internet: A Source of Enormous Confusion and Great Potential 55

53 Commonly used metrics Clustering Coefficient Diameter Degree Distribution 56

54 Methodology 1)Make observations (conduct measurement studies) 2)Build model to explain observations Choose the right level of granularity (zoom level) Strip the problem to a simple form Attempt to formulate the problem and model the system 3)Validate model Reproduce observations/measurements Explain observations 4)Revisit step 2 (and 1) to improve understanding 57

55 Important Articles Milgram, Stanley. "The small world problem." Psychology today 2.1 (1967): Watts, Duncan and Strogatz, Steven. "Collective dynamics of small world networks." Nature (1998): Barabási, Albert László, and Albert, Réka. "Emergence of scaling in random networks." Science 286, no (1999): Kleinberg, Jon. "The small world phenomenon: An algorithmic perspective." In ACM Symposium on Theory of computing, pp Ravi Kumar et al. "Stochastic models for the web graph." In Annual Symposium on Foundations of Computer Science, Albert, Réka, and Barabási, Albert László. "Statistical mechanics of complex networks." Reviews of modern physics 74.1 (2002): 47. Newman, Mark. "The structure and function of complex networks." SIAM review 45, no. 2 (2003): Mitzenmacher, M. (2004). "A brief history of generative models for power law and lognormal distributions." Internet mathematics, 1(2), Mark Newman. "Power laws, Pareto distributions and Zipf's law." Contemporary physics 46, no. 5 (2005): Jure Leskovec et al. "Graphs over time: densification laws, shrinking diameters and possible explanations." In ACM SIGKDD, pp Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009): W Willinger et al. Mathematics and the internet: A source of enormous confusion and great potential. In Notices of the AMS

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002

Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana. UC Berkeley SIGCOMM 2002 Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Motivations Today s Internet is built around a unicast pointto-point

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Aug 2000

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Aug 2000 Error and attack tolerance of complex networks arxiv:cond-mat/0008064v1 [cond-mat.dis-nn] 3 Aug 2000 Réka Albert, Hawoong Jeong, Albert-László Barabási Department of Physics, University of Notre Dame,

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Internet Indirection Infrastructure

Internet Indirection Infrastructure Motivations Internet Indirection Infrastructure Modified version of Ion Stoica s talk at ODU Nov 14, 05 Today s Internet is built around a unicast point-to-point communication abstraction: Send packet

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich (Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

Internet Indirection Infrastructure (i3)

Internet Indirection Infrastructure (i3) Internet Indirection Infrastructure (i3) Ion Stoica UC Berkeley March 20, 2003 The Problem Indirection: a key technique in implementing many network services, e.g., Mobility Multicast, anycast Web caching,

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks Plan of the lecture I. INTRODUCTION I. Networks: definitions, statistical characterization, examples II. Modeling frameworks II. DYNAMICAL PROCESSES I. Resilience, vulnerability II. Random walks III. Epidemic

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

Scalable P2P architectures

Scalable P2P architectures Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation

More information

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks , University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview

More information

Approaches for Quantifying

Approaches for Quantifying Approaches for Quantifying Multicast AW 2 15. 5. 2014 1 duction and Basics 2 3 4 Robustness with 5 duction Motivation High complexity leads to low predictability varies in different algorithms Long-Term

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

A Generating Function Approach to Analyze Random Graphs

A Generating Function Approach to Analyze Random Graphs A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Social and Technological Network Analysis. Lecture 6: Network Robustness and Applica=ons. Dr. Cecilia Mascolo

Social and Technological Network Analysis. Lecture 6: Network Robustness and Applica=ons. Dr. Cecilia Mascolo Social and Technological Network Analysis Lecture 6: Network Robustness and Applica=ons Dr. Cecilia Mascolo In This Lecture We revisit power- law networks and define the concept of robustness We show the

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when

More information

Using Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction

Using Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction Using Complex Network in Wireless Sensor Networks Amit Munjal, Anurag Singh, Yatindra Nath Singh Electrical Engineering Department Indian Institute of Technology Kanpur Kanpur, India Email: {amitm, anuragsg,

More information

beyond social networks

beyond social networks beyond social networks Small world phenomenon: high clustering C network >> C random graph low average shortest path l network ln( N)! neural network of C. elegans,! semantic networks of languages,! actor

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15 Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15 Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Distributed File Systems: An Overview of Peer-to-Peer Architectures. Distributed File Systems

Distributed File Systems: An Overview of Peer-to-Peer Architectures. Distributed File Systems Distributed File Systems: An Overview of Peer-to-Peer Architectures Distributed File Systems Data is distributed among many sources Ex. Distributed database systems Frequently utilize a centralized lookup

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Flat Routing on Curved Spaces

Flat Routing on Curved Spaces Flat Routing on Curved Spaces Dmitri Krioukov (CAIDA/UCSD) dima@caida.org Berkeley April 19 th, 2006 Clean slate: reassess fundamental assumptions Information transmission between nodes in networks that

More information

Topics in P2P Networked Systems

Topics in P2P Networked Systems 600.413 Topics in P2P Networked Systems Week 3 Applications Andreas Terzis Slides from Ion Stoica, Robert Morris 600.413 Spring 2003 1 Outline What we have covered so far First generation file-sharing

More information

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,

More information

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Thinking. Complexity: A Guided Tour, Chapters 15-16 Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/

More information

Distributed Data Management

Distributed Data Management Distributed Data Management Christoph Lofi José Pinto Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7.0 Network Models 7.0 Introduction 7.1 Graph Model

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

CRESCENDO GEORGE S. NOMIKOS. Advisor: Dr. George Xylomenos

CRESCENDO GEORGE S. NOMIKOS. Advisor: Dr. George Xylomenos CRESCENDO Implementation of Hierarchical Chord (Crescendo), according to Canon paradigm and evaluation, via simulation over realistic network topologies, of the Crescendo's advantages in comparison to

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

Supply chains involve complex webs of interactions among suppliers, manufacturers,

Supply chains involve complex webs of interactions among suppliers, manufacturers, D e p e n d a b l e A g e n t S y s t e m s Survivability of Multiagent-Based Supply Networks: A Topological Perspective Hari Prasad Thadakamalla, Usha Nandini Raghavan, Soundar Kumara, and Réka Albert,

More information

Random Generation of the Social Network with Several Communities

Random Generation of the Social Network with Several Communities Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe

More information

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University Course website: http://snap.stanford.edu/na09 Slides will be available online Reading material will be posted online:

More information

Strategies, approaches and ethical considerations

Strategies, approaches and ethical considerations Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

CS-E5740. Complex Networks. Scale-free networks

CS-E5740. Complex Networks. Scale-free networks CS-E5740 Complex Networks Scale-free networks Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3. Growing network models: scale-free

More information

Ian Clarke Oskar Sandberg

Ian Clarke Oskar Sandberg Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 7.0 Network Models 7.0 Introduction 7.1 Graph Model Basics 7.2

More information

Attack Vulnerability of Network with Duplication-Divergence Mechanism

Attack Vulnerability of Network with Duplication-Divergence Mechanism Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 754 758 c International Academic Publishers Vol. 48, No. 4, October 5, 2007 Attack Vulnerability of Network with Duplication-Divergence Mechanism WANG

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/4/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig Distributed Data Management Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 6.4 Other DHTs: CAN CAN is another early DHT implementation S.

More information

Examples of Complex Networks

Examples of Complex Networks Examples of Complex Networks Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

PEER-TO-PEER (P2P) systems are now one of the most

PEER-TO-PEER (P2P) systems are now one of the most IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Minimizing Churn in Distributed Systems

Minimizing Churn in Distributed Systems Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena CSE 190 Lecture 16 Data Mining and Predictive Analytics Small-world phenomena Another famous study Stanley Milgram wanted to test the (already popular) hypothesis that people in social networks are separated

More information

NDIA 19th Annual System Engineering Conference, Springfield, Virginia October 24-27, 2016

NDIA 19th Annual System Engineering Conference, Springfield, Virginia October 24-27, 2016 NDIA 19th Annual System Engineering Conference, Springfield, Virginia October 24-27, 2016 Caesar S. Benipayo, PhD Student Under advisement of Dr. Michael Grenn and Dr. Blake Roberts Department of Engineering

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

Networks and stability

Networks and stability Networks and stability Part 1A. Network topology www.weaklink.sote.hu csermelypeter@yahoo.com Peter Csermely 1. network topology 2. network dynamics 3. examples for networks 4. synthesis (complex equilibria,

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation

More information

SNA 8: network resilience. Lada Adamic

SNA 8: network resilience. Lada Adamic SNA 8: network resilience Lada Adamic Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience Q: If a given fraction

More information

Lecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013

Lecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013 Lecture 6: Securing Distributed and Networked Systems CS 598: Network Security Matthew Caesar March 12, 2013 1 Today: Distributed Internet Services Previous cycle: how to build Internet services that run

More information

Systems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow

Systems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Introduction to Engineering Systems, ESD.00 Networks II Lecture 8 Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Outline Introduction to networks Infrastructure networks Institutional

More information

Internet Indirection Infrastructure

Internet Indirection Infrastructure Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 22: Overlay networks Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

RANDOM-REAL NETWORKS

RANDOM-REAL NETWORKS RANDOM-REAL NETWORKS 1 Random networks: model A random graph is a graph of N nodes where each pair of nodes is connected by probability p: G(N,p) Random networks: model p=1/6 N=12 L=8 L=10 L=7 The number

More information

Critical Phenomena in Complex Networks

Critical Phenomena in Complex Networks Critical Phenomena in Complex Networks Term essay for Physics 563: Phase Transitions and the Renormalization Group University of Illinois at Urbana-Champaign Vikyath Deviprasad Rao 11 May 2012 Abstract

More information

COMMUNITY SHELL S EFFECT ON THE DISINTEGRATION OF SOCIAL NETWORKS

COMMUNITY SHELL S EFFECT ON THE DISINTEGRATION OF SOCIAL NETWORKS Annales Univ. Sci. Budapest., Sect. Comp. 43 (2014) 57 68 COMMUNITY SHELL S EFFECT ON THE DISINTEGRATION OF SOCIAL NETWORKS Imre Szücs (Budapest, Hungary) Attila Kiss (Budapest, Hungary) Dedicated to András

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

Decentralized Search

Decentralized Search Link Analysis and Decentralized Search Markus Strohmaier, Denis Helic Multimediale l Informationssysteme t II 1 The Memex (1945) The Memex [Bush 1945]: B A mechanized private library for individual use

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline

More information

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:

More information