1 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen, Scott Shenker ACM SIGCOMM Computer Communication Review, Proceedings of the.

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Hadi Goudarzi and Massoud Pedram
1 EP2210 Fairness Lecture material: –Bertsekas, Gallager, Data networks, 6.5 –L. Massoulie, J. Roberts, "Bandwidth sharing: objectives and algorithms,“
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
On Large-Scale Peer-to-Peer Streaming Systems with Network Coding Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto.
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Breaking the Single-Path Barrier Brad Smith Jack Baskin SoE Research Review Day 10/20/2011.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
1 Placement of Continuous Media in Wireless Peer-to-Peer Networks Shahram Ghadeharizadeh, Bhaskar Krishnamachari, Shanshan Song, IEEE Transactions on Multimedia,
Technion –Israel Institute of Technology Software Systems Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi Melamed.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
P2P Network for Very Large Virtual Environment Proceedings of the ACM symposium on virtual reality software and technology VRST '06.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Global Synchronization in Sensornets Jeremy Elson, Richard Karp, Christos Papadimitriou, Scott Shenker.
1 Modeling peer-peer file sharing systems Ge, Z.; Figueiredo, D.R.; Sharad Jaiswal; Kurose, J.; Towsley, D.; INFOCOM Twenty-Second Annual Joint Conference.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
Networked Slepian–Wolf: Theory, Algorithms, and Scaling Laws R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano, Member, IEEE, Martin Vetterli,
Making Gnutella-like P2P Systems Scalable Presented by: Karthik Lakshminarayanan Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, and Scott.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Searching in Unstructured Networks Joining Theory with P-P2P.
On Fairness, Optimizing Replica Selection in Data Grids Husni Hamad E. AL-Mistarihi and Chan Huah Yong IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
1 Unstructured P2P overlay. 2 Centralized model  e.g. Napster  global index held by central authority  direct contact between requestors and providers.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Mobiquitous'07 Poster1 On Reducing the Moving Distance in Approaching Optimal Configuration in MANETs Muddana Roopa, Akasapu Girish, Zhen Jiang Computer.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
A Prediction-based Fair Replication Algorithm in Structured P2P Systems Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang Presented by: Xianshu Zhu College.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith CohenScott Shenker Some slides are taken from the authors’ original presentation.
Dominant Resource Fairness: Fair Allocation of Multiple Resource Types Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion.
Joint Power Optimization Through VM Placement and Flow Scheduling in Data Centers DAWEI LI, JIE WU (TEMPLE UNIVERISTY) ZHIYONG LIU, AND FA ZHANG (CHINESE.
The Application of The Improved Hybrid Ant Colony Algorithm in Vehicle Routing Optimization Problem International Conference on Future Computer and Communication,
Getting the Most out of Your Sample Edith Cohen Haim Kaplan Tel Aviv University.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
Dynamic P2P Indexing and Search based on Compact Clustering Mauricio Marin Veronica Gil-Costa Cecilia Hernandez UNSL, Argentina Universidad de Chile Yahoo!
Capacity Enhancement with Relay Station Placement in Wireless Cooperative Networks Bin Lin1, Mehri Mehrjoo, Pin-Han Ho, Liang-Liang Xie and Xuemin (Sherman)
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Research Unit in Networking - University of Liège A Distributed Algorithm for Weighted Max-Min Fairness in MPLS Networks Fabian Skivée
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
Minimizing Churn in Distributed Systems P. Brighten Godfrey, Scott Shenker, and Ion Stoica UC Berkeley SIGCOMM’06.
Aug 22, 2002Sigcomm 2002 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs-research Scott Shenker ICIR.
1 Improve search in unstructured P2P overlay. 2 Peer-to-peer Networks Peers are connected by an overlay network. Users cooperate to share files (e.g.,
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
1 CSIS 7101: CSIS 7101: Spatial Data (Part 1) The R*-tree : An Efficient and Robust Access Method for Points and Rectangles Rollo Chan Chu Chung Man Mak.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Peer-to-Peer Video Systems: Storage Management CS587x Lecture Department of Computer Science Iowa State University.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
REU 2009-Traffic Analysis of IP Networks Daniel S. Allen, Mentor: Dr. Rahul Tripathi Department of Computer Science & Engineering Data Streams Data streams.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Unstructured Networks: Search Márk Jelasity. 2 Outline ● Emergence of decentralized networks ● The Gnutella network: how it worked and looked like ● Search.
OBJECT LOCATION IN UNSTRUCTURED P2P NETWORKS USING RANDOM WALK
The Capacity of Wireless Networks
Peer-to-Peer Video Services
Presentation transcript:

1 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen, Scott Shenker ACM SIGCOMM Computer Communication Review, Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, vol. 32 issue 4 Presentation by Tony Sung, MC Lab, IE CUHK 16th December 2004

2 Introduction What is an Unstructured P2P Network?  Centralized  Decentralized Structured Unstructured

3 Introduction Locating Objects in an Unstructured P2P Network  Probing  How to Reduce Probe Count? No Probing is better than Random Probing By Replication

4 Introduction Current Replication Strategies … Implicit Objective of the Paper: “ Designs an explicit replication strategy. ” “ What is the optimal way to replicate data? ”

5 Introduction Two Starting Points Uniform Replication Proportional Replication

6 Paper’s Outline  Introduction  Model and Problem Statement Defining an Allocation and the Expected Search Size Bounded Search Size and Insoluble Queries Heterogeneous Capacities and Bandwidth  Allocation Strategies Uniform and Proportional Characterizing Allocations Between Uniform and Proportional  The Square-root Allocation How much we can gain?  Square-root* and Proportional* Allocations Square-root* Allocation Proportional* Allocation  Distributed Replication Path Replication Replication with Sibling-number Memory Replication with Probe Memory Obtaining the Optimal Allocation Simulations  Conclusion

7 Today’s Outline  Introduction  Model and Problem Statement Defining an Allocation and the Expected Search Size Bounded Search Size and Insoluble Queries Heterogeneous Capacities and Bandwidth  Allocation Strategies Uniform and Proportional Characterizing Allocations Between Uniform and Proportional  The Square-root Allocation How much we can gain?  Square-root* and Proportional* Allocations Square-root* Allocation Proportional* Allocation  Distributed Replication Path Replication Replication with Sibling-number Memory Replication with Probe Memory Obtaining the Optimal Allocation Simulations  Conclusion

8 Model & Problem Statement n nodes capacity ρ total capacity R = nρ query rate q = q 1 ≥ q 2 ≥ … ≥ q m Σq i = 1 m distinct data replica r 1 r2r2 rmrm Σr i = R allocation p = (r 1 /R, r 2 /R, …, r m /R) allocation strategy: q → p

9 Model & Problem Statement n nodes capacity ρ total capacity R = nρ m distinct data query rate q = q 1 ≥ q 2 ≥ … ≥ q m replica r 1 r2r2 rmrm allocation p = (r 1 /R, r 2 /R, …, r m /R) bounds for m : R ≥ m ≥ρ bounds for p i : u ≥ p i ≥ l l = 1/R u = n/R = ρ -1 expected search size: optimization problem: Monotonicity:

10 Allocation Strategies, Uniform & Proportional Minimizes the required maximum search size Thus minimizes system resources spent on insoluble queries Minimizes maximum utilization rate. More relevant when the replication is of copies rather than of pointers

11 Allocation Strategies, Uniform & Proportional Expected Search Size A q (p) Uniform A q (p)= 1/ρΣ(q i /p i ) = 1/ρΣq i m = m/ρ Proportional A q (p)= 1/ρΣ(q i /p i ) = 1/ρΣ1 = m/ρ

12 Allocation Strategies, Characterizing Allocations Consider space allocations for two items p i, p j and q i, q j Range of allocation defined by x, 0 < x < 1, p i /(p i +p j ) = x p j /(p i +p j ) = (1-x) x = q i /(q i +q j ) [ Proportional] or 0.5 [Uniform] ESS proportional to q i /x + q j /(1-x) and is convex. ESS min occurs atwhich is independent of p.

13 Allocation Strategies, Characterizing Allocations Consider space allocations for two items p i, p j and q i, q j

14 Allocation Strategies, Between Uniform & Prop.

15 Allocation Strategies, Between Uniform & Prop.

16 Allocation Strategies, Short Conclusion  ESS of Uniform and Proportional Allocation is equal, and is equal to m/ρ  For one special case ( m=2 ), ESS is a convex function and is minimum for a square-root allocation  For any allocation p that lies between Uniform and Proportional, its ESS is at most m/ρ.  If p is different from Uniform or Proportional then its ESS is strictly less than m/ρ.

17 The Square-root Allocation

18 How much can we gain?  For uniform and proportional allocation, ESS= m/ρ  For Square-root allocation, ESS= (Σq i 1/2 ) 2 /ρ which depends on the query distribution  Define gain factor as ESS uniform /ESS SR It is shown that ESS uniform /ESS SR ≤ m(u + l - mlu) When l = 1/m or u = 1/m, the only legal allocation is p i = 1/m, and gain factor = 1 If l << 1/m, and gain factor is roughly mu.

19 How much can we gain?

20 How much can we gain?

21 Materials Left  Natural extension of Square-root and Proportional Allocation that are defined when l is fixed for a maximum search size. Similar Results  Distributed Replication Protocols for achieving Square-root Allocation Path replication, converges but unstable Replication with sibling-number memory, better Replication with probe memory, better Confirmed with Simulation

22 Conclusion  Modeled different replication strategies Uniform Proportional In-between, especially Square-root  Uniform and Proportional forms two extremes of all legal allocations  ESS is smaller in-between  Square-root is optimal