07.04.2003presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.

Slides:



Advertisements
Similar presentations
C. Mastroianni, D. Talia, O. Verta - A Super-Peer Model for Resource Discovery Services in Grids A Super-Peer Model for Building Resource Discovery Services.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
Scalable Content-Addressable Network Lintao Liu
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Cache Updates in a Peer-to-Peer Network of Mobile Agents Elias Leontiadis Vassilios V. Dimakopoulos Evaggelia Pitoura Department of Computer Science University.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
P2P Architecture Case Study: Gnutella Network
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Impact of Topology on Overlay Multicast Suat Mercan.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Advanced Computer Networks: Part 2 Complex Networks, P2P Networks and Swarm Intelligence on Graphs.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CHAPTER 3 Architectures for Distributed Systems
Plethora: Infrastructure and System Design
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Deterministic and Semantically Organized Network Topology
Presentation transcript:

presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University

presented by Hasan SÖZER2 Outline Motivation behind P2P systems Considerations Resource-Location Problem Probabilistic Search Protocol Protocol Performance Conclusion Other P2P Efforts

presented by Hasan SÖZER3 Motivation (1) Client-server model – Underusage of Internet’s bandwidth – Increasing load on dedicated servers – Vulnerable attacks to servers – Single point of failure

presented by Hasan SÖZER4 Motivation (2) P2P systems: rely on individual computer’s computing power & storage capacity – Better utilize bandwith – Distribute load in a self organizing manner – Robust to random attacks Especially, if the P2P system exhibits the “small world” property ( Most peers have few links to other peers ) – Enhance reliability leading to fault tolerance Does not rely on dedicated servers

presented by Hasan SÖZER5 Motivation (3) Some application areas of P2P systems – Distributed directory systems – E-commerce models – Web service discovery

presented by Hasan SÖZER6 Considerations P2P nodes, – act as both clients & servers – form an application network and route messages i.e. for locating a service Design of communication (messaging) protocols have crutial importance by means of efficiency Naive approaches usually fail – i.e. Gnutella’s flood routing adds traffic overhead

presented by Hasan SÖZER7 Resource Location Problem Deterministic approach: given a resource name, find the node or nodes that manage the resource – May not be feasible in a very large network Probabilistic approach: given a resource name, find with a given probability the node or nodes that manage the resource

presented by Hasan SÖZER8 Probabilistic Search Protocol (1) Trades performance and scalability for the probability P f, that a resource will be located Goal: Achieve a probability P f close to 1 with much lower cost compared to the deterministic case

presented by Hasan SÖZER9 Probabilistic Search Protocol (2) Cost Measurement – Number of messages exchanged – Bandwidth used – Number of peers contacted Abbrevations & Terms – LD: Local Directory – DC: Directory Cache – N(s): Neighborhood of peer s Nodes that are one hop away or in the same LAN

presented by Hasan SÖZER10 LD can be managed without intervention of P2P system Each source has a unique location-independent global identifier (GUID) – Can be computed with a hash function (i.e. SHA-1) or can be assigned according to the resource managed (ISBN in case of a book) DC points to the presumed location of resources managed by other peers (also contains GUID – physical address (network address) mapping) Probabilistic Search Protocol (3)

presented by Hasan SÖZER11 Probabilistic Search Protocol (4) A peer-to-peer computing system:

presented by Hasan SÖZER12 Probabilistic Search Protocol (5) The algorithm:

presented by Hasan SÖZER13 Probabilistic Search Protocol (6) An example scenario (SearchRequest message’s propagation):

presented by Hasan SÖZER14 Probabilistic Search Protocol (7) An example scenario (ResourceFound message’s propagation):

presented by Hasan SÖZER15 Probabilistic Search Protocol (8) Two basic operations: – SearchRequest(src, res, RevPath, TTL) – ResourceFound(src, res, RevPath, v) res being searched by source src was found at peer v Broadcast probability, p – Can be adjusted according to the path traversed

presented by Hasan SÖZER16 Protocol Performance (1) Model: 120 peers, average node degree = 5

presented by Hasan SÖZER17 Protocol Performance (2) When p becomes 0.6, P f reaches the value of 0.9 while only %10.5 of the peers are involved in the search A relatively small p can generate reasonable P f for finding a resource at a very low cost – Small fraction of the peer nodes are involved in the search

presented by Hasan SÖZER18 Protocol Performance (3) Implementation on a randomly generated topology – Each computer on a LAN simulates multiple peer nodes – For N peers generate a regular graph each node having k neighbours – Rewire the graph If graph becomes disconnected, restart the process

presented by Hasan SÖZER19 Protocol Performance (4) Model: N=30, k=4, P(rewiring)=0.1, size(DC)=%1*#ofRes, LRU

presented by Hasan SÖZER20 Protocol Performance (5) Maximum value of the curve occurs when p = 0.5 At this value, a resource will be found with probability 0.84 within 3.4 hops from the source on average

presented by Hasan SÖZER21 Conclusion Issues that have not been addressed: – Cache replacement policies – Cache invalidation options – Provision to avoid broadcasting a message more than once Optimization – Directly sending the result to the search source before traversing the path backwards would increase the responce time

presented by Hasan SÖZER22 Other P2P Efforts Gnutella (Used mainly for file sharing) Uses flood routing to broadcast queries Gridella (A Gnutella-compatible system) Reduces bandwidth by superimposing a binary tree on top of the P2P network Freenet (Creates a virtual file system) Pools unused disk space accross many computers JXTA (A suite of protocols) Uses specialized peers that can register with each other A middle ground between centralized and decentralized approaches