Professional Documents
Culture Documents
Progress Jan 2011 Putra
Progress Jan 2011 Putra
Progress Jan 2011 Putra
Thesis Submission
Research Summary
Pratama Putra
1
Pratama Putra Short Update January 2011
Report Summary
Thesis Submission
Research Summary
Table of contents
1 Report Summary
2 Thesis Submission
Submission Report
Thesis Structure
3 Research Summary
Outline
Layering Algorithm
Experiment Summary
2
Pratama Putra Short Update January 2011
Report Summary
Thesis Submission
Research Summary
Report Summary
Thesis Submission
Submission Report
Thesis Structure
Research Summary
Research Outline
Layering Algorithm
Experiment Result
3
Pratama Putra Short Update January 2011
Report Summary
Submission Report
Thesis Submission
Thesis Structure
Research Summary
Submission Report
4
Pratama Putra Short Update January 2011
Report Summary
Submission Report
Thesis Submission
Thesis Structure
Research Summary
Thesis Structure
Chapter 1: Introduction
Chapter 2: Related Work
Chapter 3: Measuring P2P Network Topology through
Distributed Crawlers
Chapter 4: Characterizing High Influence Using Network
Properties
Chapter 5: Network Structure Based High Influence Peers
Selection for Effective Poisoning
Chapter 6: Conclusion
5
Pratama Putra Short Update January 2011
Research Outline
Background: Problem in P2P Network
High Traffic Poisoning for Controlling Copyrighted File Distribution in P2P
Result
Apply Poisoning to 13% Peers Directly, Ends Up 85% Peers Indirectly
Increase Poisoning Target to 27% Directly, Ends Up 96% Indirectly
Conclusion
Effective Index Poisoning: Reduce Control Traffic by Order of Magnitude
Difference
Enable to Choose the Control Priority: Reduce Traffic or Max Performance
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
Level-1 Layering
Divides Network into Layers by Looking at Peers Behavior in
Search Queries:
ORIGIN: Peers that are not Relaying Queries
EDGE: Peers at the Termination of Queries
RELAY: Peers that Relaying Queries between ORIGIN and
EDGE
Level-2 Layering
Divides RELAY by Looking at Peers Proximity with EDGE
and ORIGIN
TOP: Peers Adjacent to EDGE
BOTTOM: Peers Adjacent to ORIGIN
MIDDLE: Others
7
Pratama Putra Short Update January 2011
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
8
Pratama Putra Short Update January 2011
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
Experimental Method
Evaluation Experiments
11
Pratama Putra Short Update January 2011
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
9
EDGE-Poisoning
RELAY-Poisoning
8
6
Key Spread (Normalized)
0
0 5 10 15 20 25 30 35 40 45
Time (minutes)
Figure: Exp. 1: File keys distributed to the peers in RELAY layer spread
more and faster
12
Pratama Putra Short Update January 2011
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
14000
RELAY(48%)-Poisoning
Random(48%)-Poisoning
12000
10000
8000
Key Spread
6000
4000
2000
0
0 5 10 15 20 25 30 35 40 45
Time (minutes)
12000
TOP-Poisoning
MIDDLE-Poisoning
BOTTOM-Poisoning
10000
8000
Key Spread
6000
4000
2000
0
0 5 10 15 20 25 30 35 40 45
Time (minutes)
12000
Conventional
MIDDLE
Random
10000
8000
Key Spread
6000
4000
2000
0
0 5 10 15 20 25 30 35 40 45
Time (minutes)
Figure: Exp. 4: File File keys distributed to the peers in MIDDLE layer
spread more and faster compare to random.
15
Pratama Putra Short Update January 2011
Report Summary Outline
Thesis Submission Layering Algorithm
Research Summary Experiment Summary
12000
Conventional
MIDDLE+BOTTOM Poisoning
MIDDLE
10000
8000
Key Spread
6000
4000
2000
0
0 5 10 15 20 25 30 35 40 45
Time (minutes)
Summary
17
Pratama Putra Short Update January 2011