Analyzing the Characteristics of Gnutella Overlays

Size: px
Start display at page:

Download "Analyzing the Characteristics of Gnutella Overlays"

Transcription

1 Analyzing the Characteristics of Gnutella Overlays Yong Wang Institute of Computing Technology the Chinese Academy of Sciences Beijing China Xiaochun Yun School of Computer Science and Technology Harbin Institute of Technology Harbin China Yifei Li School of Computer Science Sichuan University Chengdu China Abstract Mapping and analyzing the topological properties of P2P overlay network will benefit the further design and development of the P2P networks. In this paper, the measured Gnutella network topology is basically taken as an example. The properties of degree-rank distribution and frequency-degree distributions of the measured topology graphs are analyzed in detail. The small world characteristics for Gnutella network are discussed. The results indicate that each tier of Gnutella network shows individual characters, namely, the top level graph fits the power law in degree-rank distribution, but follows the Gaussian function in frequency-degree distribution. The bottom level graph shows power law both in its degreerank distribution and in its frequency-degree distribution. Fitting results indicate that power law could fit better for the degree-rank distribution and frequency-degree distribution of bottom level graphs, while Gaussian could describe the frequency-degree distribution of the top level graphs. Gnutella overlay network has the small world characters, but it is not a scale-free network, which has developed over time following a different set of growth processes from those of the BA (Barabási-Albert) model. The measured results show that Gnutella network has pretty well scalability as well as the abilities to tolerating failures and attacks against peers, but with low routing efficiencies. Keywords: P2P overlay network, topology measurements, scale-free network, power laws, and small world. Introduction With the rapid development of P2P networks, great attentions have been paid on P2P network topology analysis. Knowledge of appropriate metric values of P2P graphs may influence the engineering of future topologies, repair strategies in the face of failure, and P2P overlays managements. Unfortunately, most of the work in this field is focused on measuring and analyzing the degree distributions of the P2P overlay networks [~4]. The detailed scrutiny of the topological properties of complex networks has pointed out that graphs with the same degree distributions may have totally different structures; The degree rank distribution, degree distribution for each tier, and small world phenomenon of the network is one of the most important properties of topologies, which also are crucial for understanding and predicting the performance, robustness, and scalability of P2P applications. The most common method for achieving P2P overlay network topology is to construct a crawler, which works like spider of WWW network. However, discovering P2P overlay topology accurately has tremendous difficulties in that: First of all, P2P network has a large scale of size and grows rapidly, which requires high speed of peer s information collecting. Secondly, P2P overlay network has the characteristic of dynamics in nature, for happenings of peers joining and leaving network, new links adding onto P2P network are constant. Thirdly, P2P overlay network itself is highly heterogeneous. Peers connect into the P2P network by different methods, which make parts of peers behind firewalls hardly detectable [5]. Finally, zero knowledge issue. That is to say, so little is known about P2P overlay topology that it is unlikely to make much presumption due to its inherent dynamic nature, which also makes it hard to evaluate completeness, accuracy and validating of achieved topology data. The longer the crawling duration is, the more peers could be achieved, but with the less accuracy of snapshots. Therefore, the crawling system has to make trade off between topology data accuracy and completeness. Analyzing the topology characteristics of measured P2P network instances is still a big challenge for the lack of proper theories related to such complex networks. In this paper, we analyze the properties of degree and degree rank distributions, as well as small world of each tier of the Gnutella network topology with snapshots achieved The work described in this paper is supported by the National Natural Science Foundation of China under grant No

2 during Aug to Mar by our distributed Gnutella topology capturing system (called D-Crawler). 2. Related work Recently, P2P file-sharing systems have evolved in many ways to accommodate growing numbers of participating peers. New features have changed the properties of their topology. Jovanovic [6] measured the Gnutella system in 200 for the first time, which find that the Gnutella network topology is small-world and its degree distribution follows power law. As the limitations of Gnutella network old protocols, the number of total nodes achieved by Jovanovic is about K, which weakens its validation in representing the whole Gnutella network. In 2002, S. Saroiu et al. [7] has performed a detail study of the two popular P2P file sharing systems, namely Napster and Gnutella, which characterizes the population of enduser hosts participating in these two systems, including bottleneck bandwidth between hosts, IP-level latencies, frequency of hosts connecting and disconnecting from the systems, and the degree of cooperation between the hosts etc. The measurements show that there is significant heterogeneity and lack of cooperation across peers in these two P2P systems. The number of hosts achieved is about K for the lack of new methods to discover nodes in the P2P networks. Features of topology properties are not analyzed. M. Ripeanu et al. [8] implement a distributed crawling system of Gnutella network, which could capture about 30K peers in a few hours. The study concludes that the degree distributions of Gnutella network follows power-law, but the overlay network does not match the underlying Internet topology which leads to ineffective use of physical networking infrastructure. With the evolvement of the Gnutella, the properties changed significantly. A new kind of high-speed distributed crawler (called Cruiser) of Gnutella network is constructed [5], which utilizes hierarchical structure of the new Gnutella protocols; it can achieve nodes information at the speed of 40K per minute with 6 linux box machines. The degree distributions between ultra peers, ultra and leaf peers are analyzed, which have drawn conclusions that Gnutella overlay network is small-world but the degree distributions do not follow power-law. The current analysis of Gnutella overlays is mainly focusing on degree distributions. For there exist many different graphs having the same degree distributions, some of which may be considered opposites from the viewpoint of network engineering, it is incomplete and in need for corrective actions. Therefore, in this paper, we analyze properties of Gnutella s each level topology graphs by plotting and fitting degree-rank distributions, frequency-degree distributions, as well as small world phenomenon. These analyzing methods could help to understand the topological characteristics of Gnutella in detail, which has been an open problem in P2P network modeling and measurements. 3. Gnutella topology collecting We have designed and developed a distributed crawler of Gnutella system (called D-Crawler) based on positive feed back crawling strategies, which positively contacts known ultra peers to obtain several pieces of information including: () Client s version string; (2) Peer s type (ultra peer or leaf peer); (3) A list of peer s neighbors; (4) A list of peer s leaf neighbors. The system can automatically choose stable graphs and adapt its crawling behaviors according to the statistical properties of the snapshot achieved previously. D-Crawler system can capture more accurate and complete snapshots with the average nodes information achieving speed at about 60K per minute using three P4 2.8GHz/G RAM PCs. Figure illustrates the framework of D-Crawler system, the detailed analysis about its performances is discussed in ref. [9]. After required information is collected from all peers, some post-processing should be performed to remove any obvious inconsistence that has been introduced due to the dynamic changes in the Gnutella network during the crawling period, which includes: () converting snapshots into bidirectional graphs; (2) ignoring leaves which declaring themselves as the neighbors of ultra or legacy peers; (3) ignoring leaves that are parents of other leaves. About % of nodes and links are influenced by the post-processing. Figure. The framework of D-Crawler system We have captured and analyzed hundreds of snapshots during Aug to Mar. 2006, which shows that the topology relations validated by D-Crawler system have similar topological properties. To make it brief and to the point, we randomly select three snapshots as samples in this paper, the overall information of these snapshots is shown in table.

3 Table. The overall information of the snapshots Avg. Total nodes,758,76,729,63,727,945,738,773 Top level 463, ,80 465, ,55 Leaves,294,876,262,803,26,986,273,22 Avg. of top-level Avg. of leaves Characterization of Gnutella topologies Due to the topology nature of Gnutella, in this section, we analyze the following characterizations of the modern Gnutella topology: () -rank distributions, and (2) Frequency-degree distributions; (3) small world properties. These three kinds of distributions can describe the structural characteristics of Gnutella topology. It is worth clarifying that the snapshots are treated as bidirectional graphs due to the properties of TCP links. 4. -rank distribution -rank distribution, which is a powerful metric for characterizing families of graphs, can distinguish network topology of different nature. Modern Gnutella consists of two-tier sub-networks as described in section 3. Each tier has its own neighbor-choosing strategy, so it is necessary to analyze the distributions respectively. Figure 2 shows the degree-rank distributions [0] and fitness of the top-level, ultrapeers leaves and leaves parents in log-log scale, from which we find: () The degree-rank distribution of top-level (ultra to ultra peers) follows power law by three segments, the rank exponent R of each is , and respectively; (2) The degree-rank distribution of ultrapeers leaves (ultra to leaf peers) can be approximated well by the two linear regressions, the absolute correlation coefficient (ACC) is higher than 0.95 for the first segment and for the second one with R equals and for each segment; (3) The degree-rank distribution of leaves parents (leaf to ultra peers) also follows power-law by three segments, the R of each is , , and respectively. It is observed in the degree-rank distribution for the leaf to ultra peers of figure 2 that, the degree of the top 00 ranked leaves is larger than 000, the fraction of which is about 0.0% percent of total number of leaves. This is not consistent with the Gnutella protocols which specify leaf nodes should have few neighbors. The further observations show the reasons lie in: () there exist testing points in the Gnutella overlay network, which connect ultrapeers frequently to monitoring query messages in top-level graph; (2) The topology dynamics may increase degrees of the leaves which leave and join Gnutella very constantly; The distortion of topology can be reduced by decreasing crawling duration, but, for the reason of (), the testing points have changed the topology characters of Gnutella, so, the leaves with very large degree (typically larger than 000 in our observations) should be ignored when analyzing and modeling the bottom-level graphs. We also noticed that the percentage of leaves that have less than 2 parents is about 82.7%~84.3%, which is coincident with those listed in table. On the other hand, the percentage of ultrapeers with neighbors between 30 and 00 is about 62%, and the slope of the plot is nearly flat. The results indicate that the frequency-degree distribution (see section 4.2) of top-level would likely be normal Ultra to Ultra Peers exp(8.8667)*x**( ) ACC= exp(.75486)*x**( ) ACC= exp( )*x**( ) ACC= Rank U ltra to L e a f P e e rs exp( )*x**(-7.275) ACC= exp(2.0364)*x**( ) ACC= Rank

4 Leaf to Ultra Peers exp(.57382)*x**( ) A C C = exp( )*x**(-2.637) A C C = exp( )*x**( ) A C C = Rank Figure 2. The -Rank power law fitness of the measured topology graphs (in log-log plot) 4.2 Frequency-degree distribution Furthermore, we analyze frequency-degree distribution on three different objects, as top-level, ultrapeers leaves, and leaves parents. Four Probability Distribution Functions (PDFs) are selected for verifying the fitness of each distribution, listed in table 2. Table 2. Four PDFs for degree distribution fitness Function Name PDFs Power law f ( x) = Cx α ( C > 0, α < ) Gaussian Double Exponential Weibull f ( x) A ( x x0) exp 2πσ 2σ = 2 f ( x) = exp 2β γ x f ( x) = α α γ x x β 0 x exp α Figure 3 shows the frequency-degree distributions and PDFs fitness of the measured topology graphs, which indicates that: () in log-log scale, the distribution of leaves parents (leaf to ultra peers) follows power law with R=0.252 (ACC=0.989 for the fitness), but does not fit Weibull distribution well as the ACC=0.705; (2) Frequency-degree distribution of Ultrapeers leaves (ultra to leaf peers) is bell shape which, in linear scale, is fitted well by Gaussian with σ=0.933 (ACC=0.939), but double exponential function fits a little worse as ACC=0.836; (3) The distribution of top-level (ultra to ultra peers) exhibits double peeks Gaussian distribution, which, in linear scale, both Gaussian function and double exponential function can fit well with. By analyzing frequency-degree distributions of peers with different γ 2 version in Gnutella, we find that the double peeks are formed by Limewire clients with the peek around 32 overlapping upon BearShare clients with the peek 25. P(=x) P(degree=x) P(degree=x) E-3 E-4 E-5 E Leaf to Ultra Peers Power law fitting C=0.840, Alpha= ACC= Weilbull fitting Gama=.6382, Alpha= ACC= Ultra to Leaf Peers Gaussian fitting Sigma=0.9326, x0=29.409, A= ACC= Double Exponential fitting Belta=2.0402, x0= ACC= Ultra to Ultra Peers Gaussian fitting Sigma=.909, x0= , A= Sigma2=.343, x02= A2= ACC= Double Exponential fitting Belta=4.7493, x0= Belta2= , x02= ACC= Figure 3. Frequency-degree distributions and the PDF fitness of the measured topology graphs Leaves in Gnutella can choose their parents freely, Most of which have small number of parents due to the limitations of their bandwidth and computing abilities. There exist several rich ones connecting to large

5 number of parents (ultrapeers) as well as a mass of poor leaves only having one or two parents. This is consisting with the results described in (). On the other hand, Ultrapeers perform as routers in Gnutella network, the (2) and (3) mentioned above can claim that ultrapeers in Gnutella seems equal, namely, they have similarly number of neighbors which is mainly affected by the client s neighbor chosen strategies. 4.3 Small world Supposed that a vertex v in an undirected graph has d v neighbors; then there at most exist K v =d v (d v -)/2 edges between its neighbors. Let E v denote the actually existed edges between these neighbors; clustering coefficient C v of vertex v is defined as C v =Ev/Kv. Define average clustering coefficient C as the average of C v over all v: N C = C i N For friendship networks, C v reflects the extent to which friends of v are also friends of each other; and thus C measures the cliquishness of a typical friendship circle []. The Characteristic Path Length (CPL) is a measurement of the average distance needed to pass from one node to another within the graph. Nodes in Small World networks are highly clustered, at the same time, the CPL of which is bigger but pretty much equal to that of completely random graphs with the same number vertex and edges. A study by Jovanic et al. [6] in 200 concluded that the Gnutella network exhibit small world properties. In this section, we verify to what extent topologies of the Gnutella network still exhibit small world properties despite its rapid growth in network size and changes in network structure. Figure 4 illustrates the probability density distribution of shortest path between nodes on top level of the three snapshots. For the reason of the complexity calculating each node s clustering coefficient and pair-wise distance of Gnutella topology, we select 5000 nodes randomly each time to work around. The figure indicates that more than 63.3% pair-wise distance length is 4 and the whole distribution can be fit by normal distribution with sigma=0.40. Table 3 shows the ranges of clustering coefficient and CPL for the top level of the three snapshots as well as the mean values of random graphs with correspondingly the same number of vertex and edges. Besides, it includes information presented in reference [6] and three classic small world networks [2]. A graph can be loosely identified as small world network when its CPL is close to that of random graph with the same size (i.e., L gnutella L random ), but its clustering coefficient is much larger then the i= corresponding random graphs (i.e., C gnutella >>C random ). By comparing information listed in table 3, we can see that Gnutella network is small world network. The clustering coefficient increases with the size of Gnutella network, which indicates that Gnutella network is becoming tightly connected. The high clustering coefficient influences efficiency of message routing in Gnutella network, constructing a less clustered unstructured overlay network is still an open problem. P(hops=x) Gaussian fitting Sigma= x0= A=.008 ACC= Shotest path length (hops) Figure 4. The distribution and the PDF fitness of the shortest path length Network Original Gnutella Movie Actors Power Grid C. Elegans Table 3. Small world characteristics; C gnutella represents ranges of clustering coefficient for each actual graph, L gnutella denotes CPL of the graphs. C random and L random are respectively values of random graphs with the same number of vertices and edges. Networks C gnutella C random L gnutella L random Gnutella In reference [3], it is pointed out that the clustering coefficient of BA model (Barabási-Albert model) decreases with the network size, following approximately a power law C~N But, by comparing our measurements results with that of [6], it reflects that clustering coefficient of modern Gnutella increases with network size, which shows the developments of the Gnutella network over time does not follow the growth processes of BA model.

6 5 Conclusions and future work We draw conclusions from analysis in this paper as: () degree-rank distribution of the top-level exhibits three segments power laws, whereas, frequency-degree distribution is double peeks Gaussian; (2) degree-rank distribution of the ultrapeers leaves shows two-segment power laws, but frequency-degree distribution of which displayed as bell-shape ; (3) degree-rank distribution of the leaves parents is slightly abnormal, the reason of which lies in that some leaves are deployed for the purpose of query monitoring, while their frequencydegree distribution follows power law; (4) Modern Gnutella network has the properties of small world, but its evolvements follow a different set of growth processes from those of the BA model. The measured results indicate that the Gnutella overlay network has pretty well scalability as well as abilities of tolerating randomly nodes failures, but the message routing efficiency of the overlay network is low for the reason of high clustering coefficient. On the other hand, the current P2P overlay topological generators based on power-law degree distributions (the BA model) may not describe the real P2P networks (e.g., Gnutella) properly, more parameters such as degree-rank distributions and clustering coefficients et al. should be taken into considerations. Finally, the bell-shape degree distributions show that Gnutella is not scale-free network and that no super-hubs exist in the network, which are crucial to the global connectivity of the network. This implies that Gnutella overlay network (top-level graphs), which is not like SF networks, can tolerate attacks based on hub-removal strategies. We are pursuing this work in several directions, primarily based on continuously collecting more accurate snapshots from Gnutella. First, we intend to study more closely several other key topology properties (e.g., topology correlations, spectral density). Second, we plane to examine dynamics of clients participation and variations in topology structure. Finally, some security problems related to topology structure will be analyzed. [4] V Paxson, S Floyd, Wide Area Traffic: The Failure of Possion Modeling, IEEE/ACM Transaction on Networking, 995, 3 (3): [5] D. Stutzbach, R. Rejaie, Characterizing Today s Gnutella Topology, Technical Report, CIS-TR-04-02, Department of Computer Science, University or Oregon, Dec. 7, [6] M. A. Jovanovic, Modeling Large-Scale Peer-to-Peer Networks and a Case Study of Gnutella, MS. Thesis, University of Cincinnati, 200. [7] S. Saroiu, P. K. Gummadi, S. D. Gribble, A Measure me-nt Study of Peer-to-Peer File Sharing Systems, in: M ulti-media Computing and Networking (MMCN2002), Sa n Jose, CA, Jan [8] M. Ripeanu, I. Foster, A. Iamnitchi, Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design, in: IEEE Internet Computing Journal special issue on peer-to-peer networking, 2002, 6(). [9] Y. Wang, X. Yun, and Y. Li, An P2P Network Accurate Topology Capturing System, to be published in Journal of Computer Engineering (in Chinese with English abstract), 2007,9. [0] M. Faloutsos, P. Faloutsos, and C. Faloutsos, On Power-law Relationship of the Internet Topology, ACM SIGCOMM Computer Communication Review, 999, 29(4): [] D. J. Watts, S. H. Strogatz, Collective Dynamics of Small-World Networks, Nature, 998, 393(6684): [2] D.J. Watts, Six s. In: The Essense of a Connected Egde, 2003, ACM Press. [3] R. Albert, A. Barabási, A Statistical Mechanics of Complex Networks, Reviews of Modern Physics, 2002, 74():47-97 References [] C. Wang, B. Li, Peer-to-peer overlay networks: A survey, Technical Report, Department of Computer Science, HKUST, Feb, [2] O. S. Kaya, A Glance at Peer to Peer Systems, Technical Report, Centre for Telematics and Information Technology, Univ. of Twente, the Netherlands ISSN , [3] S. Sen, J. Wang, Analyzing Peer-to-Peer Traffic across Large Networks, ACM/IEEE Transactions on Networking, 2004, 2(2):

On the Long-term Evolution of the Two-Tier Gnutella Overlay

On the Long-term Evolution of the Two-Tier Gnutella Overlay On the Long-term Evolution of the Two-Tier Gnutella Overlay Amir H. Rasti, Daniel Stutzbach, Reza Rejaie Computer and Information Science Department University of Oregon {amir, agthorr, reza}@cs.uoregon.edu

More information

Empirical Characterization of P2P Systems

Empirical Characterization of P2P Systems Empirical Characterization of P2P Systems Reza Rejaie Mirage Research Group Department of Computer & Information Science University of Oregon http://mirage.cs.uoregon.edu/ Collaborators: Daniel Stutzbach

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Characterizing Files in the Modern Gnutella Network: A Measurement Study

Characterizing Files in the Modern Gnutella Network: A Measurement Study Characterizing Files in the Modern Gnutella Network: A Measurement Study Shanyu Zhao, Daniel Stutzbach, Reza Rejaie University of Oregon {szhao, agthorr, reza}@cs.uoregon.edu The Internet has witnessed

More information

Characterizing Files in the Modern Gnutella Network

Characterizing Files in the Modern Gnutella Network Characterizing Files in the Modern Gnutella Network Daniel Stutzbach, Shanyu Zhao, Reza Rejaie University of Oregon {agthorr, szhao, reza}@cs.uoregon.edu The Internet has witnessed an explosive increase

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

On Reshaping of Clustering Coefficients in Degreebased Topology Generators

On Reshaping of Clustering Coefficients in Degreebased Topology Generators On Reshaping of Clustering Coefficients in Degreebased Topology Generators Xiafeng Li, Derek Leonard, and Dmitri Loguinov Texas A&M University Presented by Derek Leonard Agenda Motivation Statement of

More information

Characterizing files in the modern Gnutella network

Characterizing files in the modern Gnutella network Multimedia Systems DOI 1.17/s53-7-79-8 REGULAR PAPER Characterizing files in the modern Gnutella network Daniel Stutzbach Shanyu Zhao Reza Rejaie Springer-Verlag 27 Abstract The Internet has witnessed

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

Methodology for Estimating Network Distances of Gnutella Neighbors

Methodology for Estimating Network Distances of Gnutella Neighbors Methodology for Estimating Network Distances of Gnutella Neighbors Vinay Aggarwal 1, Stefan Bender 2, Anja Feldmann 1, Arne Wichmann 1 1 Technische Universität München, Germany {vinay,anja,aw}@net.in.tum.de

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

Exploiting Content Localities for Efficient Search in P2P Systems

Exploiting Content Localities for Efficient Search in P2P Systems Exploiting Content Localities for Efficient Search in PP Systems Lei Guo,SongJiang,LiXiao, and Xiaodong Zhang College of William and Mary, Williamsburg, VA 87, USA {lguo,zhang}@cs.wm.edu Los Alamos National

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,

More information

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows)

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Average clustering coefficient of a graph Overall measure

More information

An Evolving Network Model With Local-World Structure

An Evolving Network Model With Local-World Structure The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 47 423 An Evolving Network odel With

More information

Complex networks: A mixture of power-law and Weibull distributions

Complex networks: A mixture of power-law and Weibull distributions Complex networks: A mixture of power-law and Weibull distributions Ke Xu, Liandong Liu, Xiao Liang State Key Laboratory of Software Development Environment Beihang University, Beijing 100191, China Abstract:

More information

Fast and low-cost search schemes by exploiting localities in P2P networks

Fast and low-cost search schemes by exploiting localities in P2P networks J. Parallel Distrib. Comput. 65 (5) 79 74 www.elsevier.com/locate/jpdc Fast and low-cost search schemes by exploiting localities in PP networks Lei Guo a, Song Jiang b, Li Xiao c, Xiaodong Zhang a, a Department

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS. Scalability and Robustness of the Gnutella Protocol

ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS. Scalability and Robustness of the Gnutella Protocol ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Scalability and Robustness of the Gnutella Protocol Spring 2006 Final course project report Eman Elghoneimy http://www.sfu.ca/~eelghone

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Thinking. Complexity: A Guided Tour, Chapters 15-16 Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

Evolutionary Linkage Creation between Information Sources in P2P Networks

Evolutionary Linkage Creation between Information Sources in P2P Networks Noname manuscript No. (will be inserted by the editor) Evolutionary Linkage Creation between Information Sources in P2P Networks Kei Ohnishi Mario Köppen Kaori Yoshida Received: date / Accepted: date Abstract

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE

An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 2, FEBRUARY 2007 145 An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity Chen Wang, Student Member, IEEE, and Li Xiao,

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno Wednesday, March 8, 2006 Complex Networks Presenter: Jirakhom Ruttanavakul CS 790R, University of Nevada, Reno Presented Papers Emergence of scaling in random networks, Barabási & Bonabeau (2003) Scale-free

More information

Benchmarking the UB-tree

Benchmarking the UB-tree Benchmarking the UB-tree Michal Krátký, Tomáš Skopal Department of Computer Science, VŠB Technical University of Ostrava, tř. 17. listopadu 15, Ostrava, Czech Republic michal.kratky@vsb.cz, tomas.skopal@vsb.cz

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Scalable P2P architectures

Scalable P2P architectures Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Characterization of P2P Systems

Characterization of P2P Systems Characterization of P2P Systems Daniel Stutzbach and Reza Rejaie 1 Introduction Understanding existing systems and devising new P2P techniques relies on having access to representative models derived from

More information

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer Networks

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer Networks Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer Networks Mojca Ciglari and Tone Vidmar University of Ljubljana, Faculty of Computer and Information Science, Tržaška 25, Ljubljana 1000, Slovenia

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich (Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks

More information

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15 Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15 Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators

More information

Optimizing Random Walk Search Algorithms in P2P Networks

Optimizing Random Walk Search Algorithms in P2P Networks Optimizing Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik Rensselaer Polytechnic Institute Troy, New York bisnin@rpi.edu Alhussein A. Abouzeid Rensselaer Polytechnic Institute Troy, New

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Understanding the effect of streaming overlay construction on AS level traffic

Understanding the effect of streaming overlay construction on AS level traffic Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

Strategies, approaches and ethical considerations

Strategies, approaches and ethical considerations Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Structural and Temporal Properties of and Spam Networks

Structural and Temporal Properties of  and Spam Networks Technical Report no. 2011-18 Structural and Temporal Properties of E-mail and Spam Networks Farnaz Moradi Tomas Olovsson Philippas Tsigas Department of Computer Science and Engineering Chalmers University

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

CAIM: Cerca i Anàlisi d Informació Massiva

CAIM: Cerca i Anàlisi d Informació Massiva 1 / 72 CAIM: Cerca i Anàlisi d Informació Massiva FIB, Grau en Enginyeria Informàtica Slides by Marta Arias, José Balcázar, Ricard Gavaldá Department of Computer Science, UPC Fall 2016 http://www.cs.upc.edu/~caim

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Dynamics of Feedback-induced Packet Delay in Power-law Networks

Dynamics of Feedback-induced Packet Delay in Power-law Networks Dynamics of Feedback-induced Packet Delay in Power-law Networks Takahiro Hirayama, Shin ichi Arakawa, Ken-ichi Arai, and Masayuki Murata Graduate School of Information Science and Technology Osaka University,

More information

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

Churn: a Key Effect on Real-World P2P Software

Churn: a Key Effect on Real-World P2P Software 2013 42nd International Conference on Parallel Processing Churn: a Key Effect on Real-World P2P Software Cheng-Yun Ho Department of Computer Science National Chiao Tung University Hsinchu, Taiwan cyho@cs.nctu.edu.tw

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Amanda Lannie Analytical Systems Branch, Air Force Research Laboratory, NY, USA Abstract Social network analysis is

More information

Chapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han

Chapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han Chapter 1. Social Media and Social Computing October 2012 Youn-Hee Han http://link.koreatech.ac.kr 1.1 Social Media A rapid development and change of the Web and the Internet Participatory web application

More information

Attack Vulnerability of Network with Duplication-Divergence Mechanism

Attack Vulnerability of Network with Duplication-Divergence Mechanism Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 754 758 c International Academic Publishers Vol. 48, No. 4, October 5, 2007 Attack Vulnerability of Network with Duplication-Divergence Mechanism WANG

More information

Ossification of the Internet

Ossification of the Internet Ossification of the Internet The Internet evolved as an experimental packet-switched network Today, many aspects appear to be set in stone - Witness difficulty in getting IP multicast deployed - Major

More information

726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009

726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks Xiaoming Wang, Student Member, IEEE, Zhongmei Yao, Student Member,

More information

The Shape of the Internet. Slides assembled by Jeff Chase Duke University (thanks to Vishal Misra and C. Faloutsos)

The Shape of the Internet. Slides assembled by Jeff Chase Duke University (thanks to Vishal Misra and C. Faloutsos) The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to Vishal Misra and C. Faloutsos) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom

More information

Research on Community Structure in Bus Transport Networks

Research on Community Structure in Bus Transport Networks Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos UCONN CSE Technical Report: UbiNet-TR07-02 Last Update: July 2007 Abstract

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE Guido Caldarelli IMT, CNR-ISC and LIMS, London UK DTRA Grant HDTRA1-11-1-0048 INTRODUCTION The robustness and the shape Baran, P. On distributed Communications

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

ANALYSIS OF OVERLAY-UNDERLAY TOPOLOGY CORRELATION USING VISUALIZATION

ANALYSIS OF OVERLAY-UNDERLAY TOPOLOGY CORRELATION USING VISUALIZATION ANALYSIS OF OVERLAY-UNDERLAY TOPOLOGY CORRELATION USING VISUALIZATION Vinay Aggarwal Anja Feldmann Marco Gaertler Robert Görke Dorothea Wagner Deutsche Telekom Laboratories Universität Karlsruhe (TH) Berlin,

More information

Topologies and Centralities of Replied Networks on Bulletin Board Systems

Topologies and Centralities of Replied Networks on Bulletin Board Systems Topologies and Centralities of Replied Networks on Bulletin Board Systems Qin Sen 1,2 Dai Guanzhong 2 Wang Lin 2 Fan Ming 2 1 Hangzhou Dianzi University, School of Sciences, Hangzhou, 310018, China 2 Northwestern

More information

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul 1 CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul Introduction Our problem is crawling a static social graph (snapshot). Given

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

On the Origin of Power Laws in Internet Topologies Λ

On the Origin of Power Laws in Internet Topologies Λ On the Origin of Power Laws in Internet Topologies Λ Alberto Medina Ibrahim Matta John Byers Computer Science Department Boston University Boston, MA 5 famedina, matta, byersg@cs.bu.edu ABSTRACT Recent

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering Bilkent University TR-06800 Ankara, Turkey

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

6. Peer-to-peer (P2P) networks I.

6. Peer-to-peer (P2P) networks I. 6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview

More information

SI Networks: Theory and Application, Fall 2008

SI Networks: Theory and Application, Fall 2008 University of Michigan Deep Blue deepblue.lib.umich.edu 2008-09 SI 508 - Networks: Theory and Application, Fall 2008 Adamic, Lada Adamic, L. (2008, November 12). Networks: Theory and Application. Retrieved

More information

Characterizing Traffic Demand Aware Overlay Routing Network Topologies

Characterizing Traffic Demand Aware Overlay Routing Network Topologies Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University

More information

Empirical analysis of online social networks in the age of Web 2.0

Empirical analysis of online social networks in the age of Web 2.0 Physica A 387 (2008) 675 684 www.elsevier.com/locate/physa Empirical analysis of online social networks in the age of Web 2.0 Feng Fu, Lianghuan Liu, Long Wang Center for Systems and Control, College of

More information

Scale Free Network Growth By Ranking. Santo Fortunato, Alessandro Flammini, and Filippo Menczer

Scale Free Network Growth By Ranking. Santo Fortunato, Alessandro Flammini, and Filippo Menczer Scale Free Network Growth By Ranking Santo Fortunato, Alessandro Flammini, and Filippo Menczer Motivation Network growth is usually explained through mechanisms that rely on node prestige measures, such

More information

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization May 2014 Prepared by: Zeus Kerravala The Top Five Reasons to Deploy Software-Defined Networks and Network Functions

More information