Modeling Peer-to-Peer Connections over a Smartphone Network

被引:0
|
作者
Berta, Arpad [1 ]
Szabo, Zoltan [1 ]
Jelasity, Mark [1 ,2 ]
机构
[1] Univ Szeged, Szeged, Hungary
[2] MTA SZTE, Res Grp AI, Szeged, Hungary
关键词
peer-to-peer networks; modeling connections; smartphone trace;
D O I
10.1145/3428662.3428791
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartphones offer a natural platform for building decentralized systems for the common good. A very important problem in such systems is understanding the limitations of building a peer-to-peer (P2P) overlay network, given that today's networking infrastructure is designed with centralized services in mind. We performed measurements over smartphones over several years and collected large amounts of data about, among other things, P2P connection success. Here, we train models of P2P connection success using machine learning based on several features that are observable by the devices. We argue that connection success is a non-trivial function of many such features. Besides this, the predictive models are also rather dynamic and a good model can perform rather badly if it is based on data that is more than a year old. The degree distribution of the P2P network based on this model has an interesting structure. We can identify two modes that roughly correspond to "very closed", and "average" nodes, and a rather long tail that contains relatively open nodes. Our model allows us to perform realistic simulations of very large overlay networks, when combined with device measurement traces. This enables us to have a more informed design of decentralized applications.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [21] ELA: A fully distributed VPN system over peer-to-peer network
    Aoyagi, S
    Takizawa, M
    Saito, M
    Aida, H
    Tokuda, H
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, : 89 - 92
  • [22] Multi-Stream Video Conferencing Over a Peer-to-Peer Network
    van Wijngaarden, Adriaan J. de Lind
    Erman, Bilgehan
    Matthews, Elissa P.
    Sharp, Ron
    Sutter, Edward
    BELL LABS TECHNICAL JOURNAL, 2010, 15 (02) : 229 - 243
  • [23] A peer-to-peer expressway over Chord
    Tanta-ngai, Hathai
    McAllister, Michael
    MATHEMATICAL AND COMPUTER MODELLING, 2006, 44 (7-8) : 659 - 677
  • [24] Modeling and caching of peer-to-peer traffic
    Saleh, Osama
    Hefeeda, Mohamed
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2006, : 243 - +
  • [25] A Review of Network Modeling and Services Integration in Peer-to-Peer Electricity Markets
    Dukovska, Irena
    Slootweg, Han
    Paterakis, Nikolaos G.
    2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [26] TELETRAFFIC MODELING OF PEER-TO-PEER TRAFFIC
    Eittenberger, Philipp M.
    Krieger, Udo R.
    Markovich, Natalia M.
    2012 WINTER SIMULATION CONFERENCE (WSC), 2012,
  • [27] Detecting and preventing peer-to-peer connections by Linux iptables
    Othman, Mohamed
    Kermanian, Mostafa Nikpour
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2243 - 2248
  • [28] Modeling and Analysis of Peer-to-Peer Botnets
    Feng, Liping
    Liao, Xiaofeng
    Han, Qi
    Song, Lipeng
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2012, 2012
  • [29] Modeling the propagation of Peer-to-Peer worms
    Fan, Xiang
    Xiang, Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08): : 1433 - 1443
  • [30] Propagation Modeling of Peer-to-Peer Worms
    Fan, Xiang
    Xiang, Yang
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1128 - 1135