SlideShare uma empresa Scribd logo
1 de 29
Necessity of
Supernodes
David Hadaller, Kevin
Regan and Tyrel Russell
P2P Networks

Internet application
Application Layer Overlay Networks




                 2
Problems of P2P Networks



Scalability
Security
Anonimity
Fault Tolerant




                 3
P2P
         Structured Unstructured
Networks
 Centralized       Napster            ???


Decentralized   Chord/Tapestry   Gnutella/Kazaa




                     4
The centralized and unstructured
decentralized systems are not scalable
in their vanilla form
Structured decentralized networks are
scalable
But require the topology to be of a
certain structure




                  5
Alternatives...

The addition of supernodes seems to
make unstructured decentralized
networks scalable
Why?




                6
Three Directions
Traditional Decentralized
Unstructured (Flooding) P2P
Networks
Graph Theoretical Bounds
Decentralized Structured P2P
Networks



                7
What is a Peer-to-
 Peer System?
Most commonly used for file sharing
Napster released 1999, shutdown 2001
Gnutella released 2000
Kazaa released 2001
Today: millions of users sharing
petabytes of data
System Interaction

 User issues a keyword search
 Network returns list of peers contain
 matching files
Architecture
A peer operates as both a client and a
server
Idea: Everyone is equal, everyone
cooperates (both not true)
File sharing:
-FastTrack (Kazaa, Kazaa Lite)
-Gnutella (Morpheus, LimeWire)
How do Unstructured Peer-
 to-Peer Systems Work?
Scalability Issues



 Gnutella not
  scalable
Making Gnutella Scalable
  Chawathe et al. obtained 3 to 5x improvement in system capacity

    Adding nodes of higher degree




                                    Kazaa
Host Characteristics




            6% users very well connected

            10% of sessions >5 hrs
Impact of File Sharing
Study at the University of Washington
 P2P accounts for 43% Internet traffic
 Web accounts for 14%
Graph Theory
Formulate the problem as a Graph
Theory Problem
Let the P2P network be a graph G
where G is a set of vertices V and
there exists an edge between two
nodes u,v∈V when u is a neighbour of
v in the overlay network


               16
Some Definitions


Maximum Degree We denote ∆ as the maximum over
the degree of all vertices of a graph.

Minimum (u,v)-path We denote the minimum path
between two vertices u, v, u ≠ v, as d(u, v).

Diameter We define diameter D as the length of the max
d(u, v) for all u, v ∈ V




                       17
Moore Bound
Upper bound on number of vertices in
a graph with max degree Δ and
diameter D
                                      D
n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)

    ∆(∆ − 1)D − 2
  ≤               = n0 (D, ∆)
       ∆−2


           n(∆−2)+2
     log      ∆
D≥
       log(∆ − 1)


                      18
Moore Bound
                               d(u,v) = D



                                                    v
              d(u,v) = 2                                v


                                 v
    d(u,v) = 1
                                     v      v
                                                !-1

                 v
                     v
                           !-1
                                                v

u
          !
                           v




          v


    n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D



                               19
Special Graphs
Moore Graph

   Have equivilence in the Moore bound

   Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57

   Diameter more than 3: No Moore graphs exist

de Bruijn Graph
                                      8     4


Leland-Solomon Graph              6              3




                              9                      2




                                  7              1



                                      5     0




                         20
Random Graphs

We are interested in property Q, so for a graph of size n

   Enumerate the number of possible graphs with Q

   If proportion of graphs with Q → 1 as n → ∞

   Then we say that almost every graph has property Q




                          21
Random Graphs


Some properties: almost every graph

   has diameter 2

   is k-connected for a fixed k > 2

   has no complete subgraph Hk where k > 2log2n




                         22
Random Graphs



For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter


                                           6∆
D ≥ log∆−1 n + log∆−1 logn − log∆−1                 +1
                                          ∆−2




                         23
Graph Theory
           Summary
There is a theorectical limit to search in a
P2P network

As logn increases the time to search will
increase by roughly O(logn)




                    24
Distributed Hash
      Tables
Distributed Hash Tables (DHTs) are
an implementation of a decentralized,
structured peer-to-peer network
The diameter of the network scales
logarithmically with the size of the
network
Node degree varies from O(1) to
O(log n)

                 25
Implementations


Tapestry - Plaxton Mesh

CAN - d-dimensional Torus

Pastry - Logical Ring

Chord - Logical Ring with Chords

Koorde - Logical Ring with deBruijn Graphs

HyperCuP - Hypercube




                    26
Number of
Name                   Degree      Diameter
             Nodes

Tapestry      N        O(log N)    O(log N)

CAN           N          O(d)      O(n1/d)

Pastry        N        O(log N)    O(log N)

Chord         N        O(log N)    O(log N)

Koorde        N          O(1)      O(log N)

HyperCuP      N        O((b-1)l)   O(log N)
Conclusion
Graph theory gives us a way to bound
almost any random graph with a given
number of nodes and a maximum
degree
Flooding P2P networks have looked at
scalability from an empirical
perspective
Distributed Hash Tables provide a
scalable method for P2P at the cost of

                28
Questions?


    29

Mais conteúdo relacionado

Mais procurados

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
nozomuhamada
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
nozomuhamada
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
Masahiro Suzuki
 

Mais procurados (20)

2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
Dijkstra c
Dijkstra cDijkstra c
Dijkstra c
 
Lecture#9
Lecture#9Lecture#9
Lecture#9
 
P5 - Routing Protocols
P5 - Routing ProtocolsP5 - Routing Protocols
P5 - Routing Protocols
 
Complex and Social Network Analysis in Python
Complex and Social Network Analysis in PythonComplex and Social Network Analysis in Python
Complex and Social Network Analysis in Python
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
 
Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01Epsrcws08 campbell isvm_01
Epsrcws08 campbell isvm_01
 
Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++Pixel RNN to Pixel CNN++
Pixel RNN to Pixel CNN++
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Non-local Neural Network
Non-local Neural NetworkNon-local Neural Network
Non-local Neural Network
 
5.5 back track
5.5 back track5.5 back track
5.5 back track
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithm
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
 

Destaque

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
Kalman Graffi
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
Wei Tsang Ooi
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 

Destaque (11)

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Semelhante a P2P Supernodes

Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic Architectures
CTOGreenITHub
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateos
David Mateos
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
Chiamin Hsu
 

Semelhante a P2P Supernodes (20)

Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Sorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic ArchitecturesSorting and Routing on Hypercubes and Hypercubic Architectures
Sorting and Routing on Hypercubes and Hypercubic Architectures
 
Lecture warshall floyd
Lecture warshall floydLecture warshall floyd
Lecture warshall floyd
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometry
 
From RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphsFrom RNN to neural networks for cyclic undirected graphs
From RNN to neural networks for cyclic undirected graphs
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
Localized methods for diffusions in large graphs
Localized methods for diffusions in large graphsLocalized methods for diffusions in large graphs
Localized methods for diffusions in large graphs
 
Siegel
SiegelSiegel
Siegel
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
 
Chapter 5: Mapping and Scheduling
Chapter  5: Mapping and SchedulingChapter  5: Mapping and Scheduling
Chapter 5: Mapping and Scheduling
 
Distributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networksDistributed computation and reconfiguration in actively dynamic networks
Distributed computation and reconfiguration in actively dynamic networks
 
3 grechnikov
3 grechnikov3 grechnikov
3 grechnikov
 
slides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateosslides_nuclear_norm_regularization_david_mateos
slides_nuclear_norm_regularization_david_mateos
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
 
Small world effect
Small world effectSmall world effect
Small world effect
 
Analysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topologyAnalysis and design of a half hypercube interconnection network topology
Analysis and design of a half hypercube interconnection network topology
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

P2P Supernodes

  • 1. Necessity of Supernodes David Hadaller, Kevin Regan and Tyrel Russell
  • 3. Problems of P2P Networks Scalability Security Anonimity Fault Tolerant 3
  • 4. P2P Structured Unstructured Networks Centralized Napster ??? Decentralized Chord/Tapestry Gnutella/Kazaa 4
  • 5. The centralized and unstructured decentralized systems are not scalable in their vanilla form Structured decentralized networks are scalable But require the topology to be of a certain structure 5
  • 6. Alternatives... The addition of supernodes seems to make unstructured decentralized networks scalable Why? 6
  • 7. Three Directions Traditional Decentralized Unstructured (Flooding) P2P Networks Graph Theoretical Bounds Decentralized Structured P2P Networks 7
  • 8. What is a Peer-to- Peer System? Most commonly used for file sharing Napster released 1999, shutdown 2001 Gnutella released 2000 Kazaa released 2001 Today: millions of users sharing petabytes of data
  • 9. System Interaction User issues a keyword search Network returns list of peers contain matching files
  • 10. Architecture A peer operates as both a client and a server Idea: Everyone is equal, everyone cooperates (both not true) File sharing: -FastTrack (Kazaa, Kazaa Lite) -Gnutella (Morpheus, LimeWire)
  • 11. How do Unstructured Peer- to-Peer Systems Work?
  • 13. Making Gnutella Scalable Chawathe et al. obtained 3 to 5x improvement in system capacity Adding nodes of higher degree Kazaa
  • 14. Host Characteristics 6% users very well connected 10% of sessions >5 hrs
  • 15. Impact of File Sharing Study at the University of Washington P2P accounts for 43% Internet traffic Web accounts for 14%
  • 16. Graph Theory Formulate the problem as a Graph Theory Problem Let the P2P network be a graph G where G is a set of vertices V and there exists an edge between two nodes u,v∈V when u is a neighbour of v in the overlay network 16
  • 17. Some Definitions Maximum Degree We denote ∆ as the maximum over the degree of all vertices of a graph. Minimum (u,v)-path We denote the minimum path between two vertices u, v, u ≠ v, as d(u, v). Diameter We define diameter D as the length of the max d(u, v) for all u, v ∈ V 17
  • 18. Moore Bound Upper bound on number of vertices in a graph with max degree Δ and diameter D D n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1) ∆(∆ − 1)D − 2 ≤ = n0 (D, ∆) ∆−2 n(∆−2)+2 log ∆ D≥ log(∆ − 1) 18
  • 19. Moore Bound d(u,v) = D v d(u,v) = 2 v v d(u,v) = 1 v v !-1 v v !-1 v u ! v v n ≤ 1 + ∆ 1 + (∆ − 1) + · · · + (∆ − 1)D 19
  • 20. Special Graphs Moore Graph Have equivilence in the Moore bound Diameter of 2: Moore graphs only exist with Δ = 3, 7, 57 Diameter more than 3: No Moore graphs exist de Bruijn Graph 8 4 Leland-Solomon Graph 6 3 9 2 7 1 5 0 20
  • 21. Random Graphs We are interested in property Q, so for a graph of size n Enumerate the number of possible graphs with Q If proportion of graphs with Q → 1 as n → ∞ Then we say that almost every graph has property Q 21
  • 22. Random Graphs Some properties: almost every graph has diameter 2 is k-connected for a fixed k > 2 has no complete subgraph Hk where k > 2log2n 22
  • 23. Random Graphs For a fixed Δ ≥ 3 almost every Δ-regular graph has diameter 6∆ D ≥ log∆−1 n + log∆−1 logn − log∆−1 +1 ∆−2 23
  • 24. Graph Theory Summary There is a theorectical limit to search in a P2P network As logn increases the time to search will increase by roughly O(logn) 24
  • 25. Distributed Hash Tables Distributed Hash Tables (DHTs) are an implementation of a decentralized, structured peer-to-peer network The diameter of the network scales logarithmically with the size of the network Node degree varies from O(1) to O(log n) 25
  • 26. Implementations Tapestry - Plaxton Mesh CAN - d-dimensional Torus Pastry - Logical Ring Chord - Logical Ring with Chords Koorde - Logical Ring with deBruijn Graphs HyperCuP - Hypercube 26
  • 27. Number of Name Degree Diameter Nodes Tapestry N O(log N) O(log N) CAN N O(d) O(n1/d) Pastry N O(log N) O(log N) Chord N O(log N) O(log N) Koorde N O(1) O(log N) HyperCuP N O((b-1)l) O(log N)
  • 28. Conclusion Graph theory gives us a way to bound almost any random graph with a given number of nodes and a maximum degree Flooding P2P networks have looked at scalability from an empirical perspective Distributed Hash Tables provide a scalable method for P2P at the cost of 28