SlideShare a Scribd company logo
Necessity of
Supernodes
David Hadaller, Kevin
Regan and Tyrel Russell
P2P Networks

Internet application
Application Layer Overlay Networks




                 2
Problems of P2P Networks



Scalability
Security
Anonimity
Fault Tolerant




                 3
P2P
         Structured Unstructured
Networks
 Centralized       Napster            ???


Decentralized   Chord/Tapestry   Gnutella/Kazaa




                     4
The centralized and unstructured
decentralized systems are not scalable
in their vanilla form
Structured decentralized networks are
scalable
But require the topology to be of a
certain structure




                  5
Alternatives...

The addition of supernodes seems to
make unstructured decentralized
networks scalable
Why?




                6
Three Directions
Traditional Decentralized
Unstructured (Flooding) P2P
Networks
Graph Theoretical Bounds
Decentralized Structured P2P
Networks



                7
What is a Peer-to-
 Peer System?
Most commonly used for file sharing
Napster released 1999, shutdown 2001
Gnutella released 2000
Kazaa released 2001
Today: millions of users sharing
petabytes of data
System Interaction

 User issues a keyword search
 Network returns list of peers contain
 matching files
Architecture
A peer operates as both a client and a
server
Idea: Everyone is equal, everyone
cooperates (both not true)
File sharing:
-FastTrack (Kazaa, Kazaa Lite)
-Gnutella (Morpheus, LimeWire)
How do Unstructured Peer-
 to-Peer Systems Work?
Scalability Issues



 Gnutella not
  scalable
Making Gnutella Scalable
  Chawathe et al. obtained 3 to 5x improvement in system capacity

    Adding nodes of higher degree




                                    Kazaa
Host Characteristics




            6% users very well connected

            10% of sessions >5 hrs
Impact of File Sharing
Study at the University of Washington
 P2P accounts for 43% Internet traffic
 Web accounts for 14%
Graph Theory
Formulate the problem as a Graph
Theory Problem
Let the P2P network be a graph G
where G is a set of vertices V and
there exists an edge between two
nodes u,v∈V when u is a neighbour of
v in the overlay network


               16
Some Definitions


Maximum Degree We denote ∆ as the maximum over
the degree of all vertices of a graph.

Minimum (u,v)-path We denote the minimum path
between two vertices u, v, u ≠ v, as d(u, v).

Diameter We define diameter D as the length of the max
d(u, v) for all u, v ∈ V




                       17
Moore Bound
Upper bound on number of vertices in
a graph with max degree Δ and
diameter D
                                      D
n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)

    ∆(∆ − 1)D − 2
  ≤               = n0 (D, ∆)
       ∆−2


           n(∆−2)+2
     log      ∆
D≥
       log(∆ − 1)


                      18
Moore Bound
                               d(u,v) = D



                                                    v
              d(u,v) = 2                                v


                                 v
    d(u,v) = 1
                                     v      v
                                                !-1

                 v
                     v
                           !-1
                                                v

u
          !
                           v




          v


    n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D



                               19
Special Graphs
Moore Graph

   Have equivilence in the Moore bound

   Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57

   Diameter more than 3: No Moore graphs exist

de Bruijn Graph
                                      8     4


Leland-Solomon Graph              6              3




                              9                      2




                                  7              1



                                      5     0




                         20
Random Graphs

We are interested in property Q, so for a graph of size n

   Enumerate the number of possible graphs with Q

   If proportion of graphs with Q → 1 as n → ∞

   Then we say that almost every graph has property Q




                          21
Random Graphs


Some properties: almost every graph

   has diameter 2

   is k-connected for a fixed k > 2

   has no complete subgraph Hk where k > 2log2n




                         22
Random Graphs



For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter


                                           6∆
D ≥ log∆−1 n + log∆−1 logn − log∆−1                 +1
                                          ∆−2




                         23
Graph Theory
           Summary
There is a theorectical limit to search in a
P2P network

As logn increases the time to search will
increase by roughly O(logn)




                    24
Distributed Hash
      Tables
Distributed Hash Tables (DHTs) are
an implementation of a decentralized,
structured peer-to-peer network
The diameter of the network scales
logarithmically with the size of the
network
Node degree varies from O(1) to
O(log n)

                 25
Implementations


Tapestry - Plaxton Mesh

CAN - d-dimensional Torus

Pastry - Logical Ring

Chord - Logical Ring with Chords

Koorde - Logical Ring with deBruijn Graphs

HyperCuP - Hypercube




                    26
Number of
Name                   Degree      Diameter
             Nodes

Tapestry      N        O(log N)    O(log N)

CAN           N          O(d)      O(n1/d)

Pastry        N        O(log N)    O(log N)

Chord         N        O(log N)    O(log N)

Koorde        N          O(1)      O(log N)

HyperCuP      N        O((b-1)l)   O(log N)
Conclusion
Graph theory gives us a way to bound
almost any random graph with a given
number of nodes and a maximum
degree
Flooding P2P networks have looked at
scalability from an empirical
perspective
Distributed Hash Tables provide a
scalable method for P2P at the cost of

                28
Questions?


    29

More Related Content

What's hot

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
nozomuhamada
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
nozomuhamada
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
Samir Crypticus
 
Dijkstra c
Dijkstra cDijkstra c
Dijkstra c
shrikant00786
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
Ali Shah
 
P5 - Routing Protocols
P5 - Routing ProtocolsP5 - Routing Protocols
P5 - Routing Protocols
Kurniawan Dwi Irianto
 
Complex and Social Network Analysis in Python
Complex and Social Network Analysis in PythonComplex and Social Network Analysis in Python
Complex and Social Network Analysis in Python
rik0
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
Marcus Märtens
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
Fransiskeran
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
Masahiro Suzuki
 
Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01
Cheng Feng
 
Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++
Dongheon Lee
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
VARUN KUMAR
 
Non-local Neural Network
Non-local Neural NetworkNon-local Neural Network
Non-local Neural Network
Hiroshi Fukui
 
5.5 back track
5.5 back track5.5 back track
5.5 back track
Krish_ver2
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
Krish_ver2
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
Rajendran
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithm
mansab MIRZA
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ijitjournal
 

What's hot (20)

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
Dijkstra c
Dijkstra cDijkstra c
Dijkstra c
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
 
P5 - Routing Protocols
P5 - Routing ProtocolsP5 - Routing Protocols
P5 - Routing Protocols
 
Complex and Social Network Analysis in Python
Complex and Social Network Analysis in PythonComplex and Social Network Analysis in Python
Complex and Social Network Analysis in Python
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
 
Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01
 
Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Non-local Neural Network
Non-local Neural NetworkNon-local Neural Network
Non-local Neural Network
 
5.5 back track
5.5 back track5.5 back track
5.5 back track
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithm
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
 

Viewers also liked

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
Kalman Graffi
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
Kalman Graffi
 
Peer to peer
Peer to peerPeer to peer
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
Wei Tsang Ooi
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
Webix.pk
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
venkatesh munirathinam
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 

Viewers also liked (11)

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Similar to P2P Supernodes

Threshold network models
Threshold network modelsThreshold network models
Threshold network models
Naoki Masuda
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
Tokyo Tech (Tokyo Institute of Technology)
 
Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic Architectures
CTOGreenITHub
 
Lecture warshall floyd
Lecture warshall floydLecture warshall floyd
Lecture warshall floyd
Divya Ks
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometry
ppd1961
 
From RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphsFrom RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphs
tuxette
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
Don Sheehy
 
Dijkstra
DijkstraDijkstra
Dijkstra
David Wood
 
Dijkstra
DijkstraDijkstra
Dijkstra
David Wood
 
Localized methods for diffusions in large graphs
Localized methods for diffusions in large graphsLocalized methods for diffusions in large graphs
Localized methods for diffusions in large graphs
David Gleich
 
Siegel
SiegelSiegel
Siegel
Joel Siegel
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Vladimir Kulyukin
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and Scheduling
Heman Pathak
 
Distributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksDistributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networks
Peter Kos
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikov
Yandex
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateos
David Mateos
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
DennyHermawan15
 
Small world effect
Small world effectSmall world effect
Small world effect
Zvi Lotker
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topology
Amir Masoud Sefidian
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
Chiamin Hsu
 

Similar to P2P Supernodes (20)

Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic Architectures
 
Lecture warshall floyd
Lecture warshall floydLecture warshall floyd
Lecture warshall floyd
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometry
 
From RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphsFrom RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphs
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Localized methods for diffusions in large graphs
Localized methods for diffusions in large graphsLocalized methods for diffusions in large graphs
Localized methods for diffusions in large graphs
 
Siegel
SiegelSiegel
Siegel
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and Scheduling
 
Distributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksDistributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networks
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikov
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateos
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
 
Small world effect
Small world effectSmall world effect
Small world effect
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topology
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 

Recently uploaded

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

P2P Supernodes

  • 1. Necessity of Supernodes David Hadaller, Kevin Regan and Tyrel Russell
  • 3. Problems of P2P Networks Scalability Security Anonimity Fault Tolerant 3
  • 4. P2P Structured Unstructured Networks Centralized Napster ??? Decentralized Chord/Tapestry Gnutella/Kazaa 4
  • 5. The centralized and unstructured decentralized systems are not scalable in their vanilla form Structured decentralized networks are scalable But require the topology to be of a certain structure 5
  • 6. Alternatives... The addition of supernodes seems to make unstructured decentralized networks scalable Why? 6
  • 7. Three Directions Traditional Decentralized Unstructured (Flooding) P2P Networks Graph Theoretical Bounds Decentralized Structured P2P Networks 7
  • 8. What is a Peer-to- Peer System? Most commonly used for file sharing Napster released 1999, shutdown 2001 Gnutella released 2000 Kazaa released 2001 Today: millions of users sharing petabytes of data
  • 9. System Interaction User issues a keyword search Network returns list of peers contain matching files
  • 10. Architecture A peer operates as both a client and a server Idea: Everyone is equal, everyone cooperates (both not true) File sharing: -FastTrack (Kazaa, Kazaa Lite) -Gnutella (Morpheus, LimeWire)
  • 11. How do Unstructured Peer- to-Peer Systems Work?
  • 13. Making Gnutella Scalable Chawathe et al. obtained 3 to 5x improvement in system capacity Adding nodes of higher degree Kazaa
  • 14. Host Characteristics 6% users very well connected 10% of sessions >5 hrs
  • 15. Impact of File Sharing Study at the University of Washington P2P accounts for 43% Internet traffic Web accounts for 14%
  • 16. Graph Theory Formulate the problem as a Graph Theory Problem Let the P2P network be a graph G where G is a set of vertices V and there exists an edge between two nodes u,v∈V when u is a neighbour of v in the overlay network 16
  • 17. Some Definitions Maximum Degree We denote ∆ as the maximum over the degree of all vertices of a graph. Minimum (u,v)-path We denote the minimum path between two vertices u, v, u ≠ v, as d(u, v). Diameter We define diameter D as the length of the max d(u, v) for all u, v ∈ V 17
  • 18. Moore Bound Upper bound on number of vertices in a graph with max degree Δ and diameter D D n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1) ∆(∆ − 1)D − 2 ≤ = n0 (D, ∆) ∆−2 n(∆−2)+2 log ∆ D≥ log(∆ − 1) 18
  • 19. Moore Bound d(u,v) = D v d(u,v) = 2 v v d(u,v) = 1 v v !-1 v v !-1 v u ! v v n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D 19
  • 20. Special Graphs Moore Graph Have equivilence in the Moore bound Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57 Diameter more than 3: No Moore graphs exist de Bruijn Graph 8 4 Leland-Solomon Graph 6 3 9 2 7 1 5 0 20
  • 21. Random Graphs We are interested in property Q, so for a graph of size n Enumerate the number of possible graphs with Q If proportion of graphs with Q → 1 as n → ∞ Then we say that almost every graph has property Q 21
  • 22. Random Graphs Some properties: almost every graph has diameter 2 is k-connected for a fixed k > 2 has no complete subgraph Hk where k > 2log2n 22
  • 23. Random Graphs For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter 6∆ D ≥ log∆−1 n + log∆−1 logn − log∆−1 +1 ∆−2 23
  • 24. Graph Theory Summary There is a theorectical limit to search in a P2P network As logn increases the time to search will increase by roughly O(logn) 24
  • 25. Distributed Hash Tables Distributed Hash Tables (DHTs) are an implementation of a decentralized, structured peer-to-peer network The diameter of the network scales logarithmically with the size of the network Node degree varies from O(1) to O(log n) 25
  • 26. Implementations Tapestry - Plaxton Mesh CAN - d-dimensional Torus Pastry - Logical Ring Chord - Logical Ring with Chords Koorde - Logical Ring with deBruijn Graphs HyperCuP - Hypercube 26
  • 27. Number of Name Degree Diameter Nodes Tapestry N O(log N) O(log N) CAN N O(d) O(n1/d) Pastry N O(log N) O(log N) Chord N O(log N) O(log N) Koorde N O(1) O(log N) HyperCuP N O((b-1)l) O(log N)
  • 28. Conclusion Graph theory gives us a way to bound almost any random graph with a given number of nodes and a maximum degree Flooding P2P networks have looked at scalability from an empirical perspective Distributed Hash Tables provide a scalable method for P2P at the cost of 28