SlideShare una empresa de Scribd logo
1 de 29
Necessity of
Supernodes
David Hadaller, Kevin
Regan and Tyrel Russell
P2P Networks

Internet application
Application Layer Overlay Networks




                 2
Problems of P2P Networks



Scalability
Security
Anonimity
Fault Tolerant




                 3
P2P
         Structured Unstructured
Networks
 Centralized       Napster            ???


Decentralized   Chord/Tapestry   Gnutella/Kazaa




                     4
The centralized and unstructured
decentralized systems are not scalable
in their vanilla form
Structured decentralized networks are
scalable
But require the topology to be of a
certain structure




                  5
Alternatives...

The addition of supernodes seems to
make unstructured decentralized
networks scalable
Why?




                6
Three Directions
Traditional Decentralized
Unstructured (Flooding) P2P
Networks
Graph Theoretical Bounds
Decentralized Structured P2P
Networks



                7
What is a Peer-to-
 Peer System?
Most commonly used for file sharing
Napster released 1999, shutdown 2001
Gnutella released 2000
Kazaa released 2001
Today: millions of users sharing
petabytes of data
System Interaction

 User issues a keyword search
 Network returns list of peers contain
 matching files
Architecture
A peer operates as both a client and a
server
Idea: Everyone is equal, everyone
cooperates (both not true)
File sharing:
-FastTrack (Kazaa, Kazaa Lite)
-Gnutella (Morpheus, LimeWire)
How do Unstructured Peer-
 to-Peer Systems Work?
Scalability Issues



 Gnutella not
  scalable
Making Gnutella Scalable
  Chawathe et al. obtained 3 to 5x improvement in system capacity

    Adding nodes of higher degree




                                    Kazaa
Host Characteristics




            6% users very well connected

            10% of sessions >5 hrs
Impact of File Sharing
Study at the University of Washington
 P2P accounts for 43% Internet traffic
 Web accounts for 14%
Graph Theory
Formulate the problem as a Graph
Theory Problem
Let the P2P network be a graph G
where G is a set of vertices V and
there exists an edge between two
nodes u,v∈V when u is a neighbour of
v in the overlay network


               16
Some Definitions


Maximum Degree We denote ∆ as the maximum over
the degree of all vertices of a graph.

Minimum (u,v)-path We denote the minimum path
between two vertices u, v, u ≠ v, as d(u, v).

Diameter We define diameter D as the length of the max
d(u, v) for all u, v ∈ V




                       17
Moore Bound
Upper bound on number of vertices in
a graph with max degree Δ and
diameter D
                                      D
n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)

    ∆(∆ − 1)D − 2
  ≤               = n0 (D, ∆)
       ∆−2


           n(∆−2)+2
     log      ∆
D≥
       log(∆ − 1)


                      18
Moore Bound
                               d(u,v) = D



                                                    v
              d(u,v) = 2                                v


                                 v
    d(u,v) = 1
                                     v      v
                                                !-1

                 v
                     v
                           !-1
                                                v

u
          !
                           v




          v


    n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D



                               19
Special Graphs
Moore Graph

   Have equivilence in the Moore bound

   Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57

   Diameter more than 3: No Moore graphs exist

de Bruijn Graph
                                      8     4


Leland-Solomon Graph              6              3




                              9                      2




                                  7              1



                                      5     0




                         20
Random Graphs

We are interested in property Q, so for a graph of size n

   Enumerate the number of possible graphs with Q

   If proportion of graphs with Q → 1 as n → ∞

   Then we say that almost every graph has property Q




                          21
Random Graphs


Some properties: almost every graph

   has diameter 2

   is k-connected for a fixed k > 2

   has no complete subgraph Hk where k > 2log2n




                         22
Random Graphs



For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter


                                           6∆
D ≥ log∆−1 n + log∆−1 logn − log∆−1                 +1
                                          ∆−2




                         23
Graph Theory
           Summary
There is a theorectical limit to search in a
P2P network

As logn increases the time to search will
increase by roughly O(logn)




                    24
Distributed Hash
      Tables
Distributed Hash Tables (DHTs) are
an implementation of a decentralized,
structured peer-to-peer network
The diameter of the network scales
logarithmically with the size of the
network
Node degree varies from O(1) to
O(log n)

                 25
Implementations


Tapestry - Plaxton Mesh

CAN - d-dimensional Torus

Pastry - Logical Ring

Chord - Logical Ring with Chords

Koorde - Logical Ring with deBruijn Graphs

HyperCuP - Hypercube




                    26
Number of
Name                   Degree      Diameter
             Nodes

Tapestry      N        O(log N)    O(log N)

CAN           N          O(d)      O(n1/d)

Pastry        N        O(log N)    O(log N)

Chord         N        O(log N)    O(log N)

Koorde        N          O(1)      O(log N)

HyperCuP      N        O((b-1)l)   O(log N)
Conclusion
Graph theory gives us a way to bound
almost any random graph with a given
number of nodes and a maximum
degree
Flooding P2P networks have looked at
scalability from an empirical
perspective
Distributed Hash Tables provide a
scalable method for P2P at the cost of

                28
Questions?


    29

Más contenido relacionado

La actualidad más candente

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approachnozomuhamada
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlonozomuhamada
 
Complex and Social Network Analysis in Python
Complex and Social Network Analysis in PythonComplex and Social Network Analysis in Python
Complex and Social Network Analysis in Pythonrik0
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksmourya chandra
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network PropertiesMarcus Märtens
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...Masahiro Suzuki
 
Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Cheng Feng
 
Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Dongheon Lee
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
Non-local Neural Network
Non-local Neural NetworkNon-local Neural Network
Non-local Neural NetworkHiroshi Fukui
 
5.5 back track
5.5 back track5.5 back track
5.5 back trackKrish_ver2
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s Krish_ver2
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower boundsRajendran
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithmmansab MIRZA
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTijitjournal
 

La actualidad más candente (20)

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
Dijkstra c
Dijkstra cDijkstra c
Dijkstra c
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
 
P5 - Routing Protocols
P5 - Routing ProtocolsP5 - Routing Protocols
P5 - Routing Protocols
 
Complex and Social Network Analysis in Python
Complex and Social Network Analysis in PythonComplex and Social Network Analysis in Python
Complex and Social Network Analysis in Python
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
 
Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01
 
Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Non-local Neural Network
Non-local Neural NetworkNon-local Neural Network
Non-local Neural Network
 
5.5 back track
5.5 back track5.5 back track
5.5 back track
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithm
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
 

Destacado

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006Kalman Graffi
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...Kalman Graffi
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureWei Tsang Ooi
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networkingWebix.pk
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 

Destacado (11)

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Similar a P2P Supernodes

Threshold network models
Threshold network modelsThreshold network models
Threshold network modelsNaoki Masuda
 
Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesCTOGreenITHub
 
Lecture warshall floyd
Lecture warshall floydLecture warshall floyd
Lecture warshall floydDivya Ks
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometryppd1961
 
From RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphsFrom RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphstuxette
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via MeshingDon Sheehy
 
Localized methods for diffusions in large graphs
Localized methods for diffusions in large graphsLocalized methods for diffusions in large graphs
Localized methods for diffusions in large graphsDavid Gleich
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Vladimir Kulyukin
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and SchedulingHeman Pathak
 
Distributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksDistributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksPeter Kos
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikovYandex
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosDavid Mateos
 
Small world effect
Small world effectSmall world effect
Small world effectZvi Lotker
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAmir Masoud Sefidian
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large ImagesChiamin Hsu
 

Similar a P2P Supernodes (20)

Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic Architectures
 
Lecture warshall floyd
Lecture warshall floydLecture warshall floyd
Lecture warshall floyd
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometry
 
From RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphsFrom RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphs
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Localized methods for diffusions in large graphs
Localized methods for diffusions in large graphsLocalized methods for diffusions in large graphs
Localized methods for diffusions in large graphs
 
Siegel
SiegelSiegel
Siegel
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and Scheduling
 
Distributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksDistributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networks
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikov
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateos
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
 
Small world effect
Small world effectSmall world effect
Small world effect
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topology
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

P2P Supernodes

  • 1. Necessity of Supernodes David Hadaller, Kevin Regan and Tyrel Russell
  • 3. Problems of P2P Networks Scalability Security Anonimity Fault Tolerant 3
  • 4. P2P Structured Unstructured Networks Centralized Napster ??? Decentralized Chord/Tapestry Gnutella/Kazaa 4
  • 5. The centralized and unstructured decentralized systems are not scalable in their vanilla form Structured decentralized networks are scalable But require the topology to be of a certain structure 5
  • 6. Alternatives... The addition of supernodes seems to make unstructured decentralized networks scalable Why? 6
  • 7. Three Directions Traditional Decentralized Unstructured (Flooding) P2P Networks Graph Theoretical Bounds Decentralized Structured P2P Networks 7
  • 8. What is a Peer-to- Peer System? Most commonly used for file sharing Napster released 1999, shutdown 2001 Gnutella released 2000 Kazaa released 2001 Today: millions of users sharing petabytes of data
  • 9. System Interaction User issues a keyword search Network returns list of peers contain matching files
  • 10. Architecture A peer operates as both a client and a server Idea: Everyone is equal, everyone cooperates (both not true) File sharing: -FastTrack (Kazaa, Kazaa Lite) -Gnutella (Morpheus, LimeWire)
  • 11. How do Unstructured Peer- to-Peer Systems Work?
  • 13. Making Gnutella Scalable Chawathe et al. obtained 3 to 5x improvement in system capacity Adding nodes of higher degree Kazaa
  • 14. Host Characteristics 6% users very well connected 10% of sessions >5 hrs
  • 15. Impact of File Sharing Study at the University of Washington P2P accounts for 43% Internet traffic Web accounts for 14%
  • 16. Graph Theory Formulate the problem as a Graph Theory Problem Let the P2P network be a graph G where G is a set of vertices V and there exists an edge between two nodes u,v∈V when u is a neighbour of v in the overlay network 16
  • 17. Some Definitions Maximum Degree We denote ∆ as the maximum over the degree of all vertices of a graph. Minimum (u,v)-path We denote the minimum path between two vertices u, v, u ≠ v, as d(u, v). Diameter We define diameter D as the length of the max d(u, v) for all u, v ∈ V 17
  • 18. Moore Bound Upper bound on number of vertices in a graph with max degree Δ and diameter D D n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1) ∆(∆ − 1)D − 2 ≤ = n0 (D, ∆) ∆−2 n(∆−2)+2 log ∆ D≥ log(∆ − 1) 18
  • 19. Moore Bound d(u,v) = D v d(u,v) = 2 v v d(u,v) = 1 v v !-1 v v !-1 v u ! v v n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D 19
  • 20. Special Graphs Moore Graph Have equivilence in the Moore bound Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57 Diameter more than 3: No Moore graphs exist de Bruijn Graph 8 4 Leland-Solomon Graph 6 3 9 2 7 1 5 0 20
  • 21. Random Graphs We are interested in property Q, so for a graph of size n Enumerate the number of possible graphs with Q If proportion of graphs with Q → 1 as n → ∞ Then we say that almost every graph has property Q 21
  • 22. Random Graphs Some properties: almost every graph has diameter 2 is k-connected for a fixed k > 2 has no complete subgraph Hk where k > 2log2n 22
  • 23. Random Graphs For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter 6∆ D ≥ log∆−1 n + log∆−1 logn − log∆−1 +1 ∆−2 23
  • 24. Graph Theory Summary There is a theorectical limit to search in a P2P network As logn increases the time to search will increase by roughly O(logn) 24
  • 25. Distributed Hash Tables Distributed Hash Tables (DHTs) are an implementation of a decentralized, structured peer-to-peer network The diameter of the network scales logarithmically with the size of the network Node degree varies from O(1) to O(log n) 25
  • 26. Implementations Tapestry - Plaxton Mesh CAN - d-dimensional Torus Pastry - Logical Ring Chord - Logical Ring with Chords Koorde - Logical Ring with deBruijn Graphs HyperCuP - Hypercube 26
  • 27. Number of Name Degree Diameter Nodes Tapestry N O(log N) O(log N) CAN N O(d) O(n1/d) Pastry N O(log N) O(log N) Chord N O(log N) O(log N) Koorde N O(1) O(log N) HyperCuP N O((b-1)l) O(log N)
  • 28. Conclusion Graph theory gives us a way to bound almost any random graph with a given number of nodes and a maximum degree Flooding P2P networks have looked at scalability from an empirical perspective Distributed Hash Tables provide a scalable method for P2P at the cost of 28