Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
New Sampling-Based Summary Statistics for Improving Approximate Query Answers P. B. Gibbons and Y. Matias (ACM SIGMOD 1998) Rongfang Li Feb 2007.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
SIGMOD 2006University of Alberta1 Approximately Detecting Duplicates for Streaming Data using Stable Bloom Filters Presented by Fan Deng Joint work with.
Small-world Overlay P2P Network
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
1 Maximizing Remote Work in Flooding-based P2P Systems Qixiang Sun Neil Daswani Hector Garcia-Molina Stanford University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Adaptive Content Management in Structured P2P Communities Jussi Kangasharju Keith W. Ross David A. Turner.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Distributed Computing Group Keno Albrecht Ruedi Arnold Michael Gähwiler Roger.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
Object Naming & Content based Object Search 2/3/2003.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Searching in Unstructured Networks Joining Theory with P-P2P.
Impact of Problem Centralization on Distributed Constraint Optimization Algorithms John P. Davin and Pragnesh Jay Modi Carnegie Mellon University School.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Cache Updates in a Peer-to-Peer Network of Mobile Agents Elias Leontiadis Vassilios V. Dimakopoulos Evaggelia Pitoura Department of Computer Science University.
P2P File Sharing Systems
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
Network Aware Resource Allocation in Distributed Clouds.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
A Prediction-based Fair Replication Algorithm in Structured P2P Systems Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang Presented by: Xianshu Zhu College.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
New Sampling-Based Summary Statistics for Improving Approximate Query Answers Yinghui Wang
Cache Updates in a Peer-to-Peer Network of Mobile Agents Ilias Leontiadis Master’s Thesis University of Ioannina,Greece Supervisors: Vassilios V. Dimakopoulos.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Algorithmic and Domain Centralization in Distributed Constraint Optimization Problems John P. Davin Carnegie Mellon University June 27, 2005 Committee:
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
SCOPE: Scalable Consistency in Structured P2P Systems
Kevin Lee & Adam Piechowicz 10/10/2009
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece A Peer-to-Peer Approach to Resource Discovery in Multi-Agent Systems

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 2 Multi-agent systems (MAS) Cooperating agents: Each agent offers some resources (computation, data, etc) To fulfill its goals, an agent requires resources provided by other agents Closed MAS: each agent knows all others and what they offer vs Open MAS

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 3 Open MAS How does an agent get information about other agents/resources? Common approach: directory-based (e.g. middle agent) Disadvantage: many agents and resources make the directory a performance/ reliability bottleneck Proposal: consider a p2p approach

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 4 P2P + agents In P2P, Peers (agents) offer resources Similar Problem: How to locate the peer(s) that offer a particular resource  Structured: based on the name or content of the resource place it at the appropriate node (Chord, CAN etc) vs  Unstructured: no assumption about the location of resources (Napster, Gnutella) We apply fully decentralized unstructured p2p approaches

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 5 Overview Each agent v has a cache with k entries, containing information for k resources i.e. for each of the k resources, the cache holds the contact information for an agent that provides it If an agent v has contact information for agent u then v knows u. Network of caches : if v knows u there is a link from v to u

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 6 Abstract model Network of caches (k = 2) Note: The network (graph) may be disconnected

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 7 Search algorithms Flooding-based Agent A looks for resource x  A checks its local cache, if x not in cache, A contacts its neighbors,  Each neighbor check its cache for x, if not found contacts its neighbors and so on, A number of variations based on contacting subsets of the neighbors Use the distributed network of caches to locate an agent offering a particular resource

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 8 Results, contributions Use the distributed network of caches to locate an agent offering a particular resource Algorithms for searching  Flooding (as in e.g., Gnutella),  Teeming (randomized flooding),  Random paths Performance Analysis Analytical model validated by simulation Updates  Flooding-based propagation,  Inverted cache

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 9 Results, contributions Related work [Bauer&Wang92] show that DFS of the cache network, performs better than flooding for particular topologies [Shehory00] Lattice-like cache network (each agent knows about exactly four other agents

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 10 Talk outline  Brief presentation of the analytical model  Performance results related to the search procedures  Updates  Conclusions and Future Work

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 11 Performance metrics t : maximum allowed # steps (TTL) Q t : probability of successful search – high means “other” directory mechanisms used rarely S t : average # steps to find the resource M t : average # message transmissions – as few as possible, for speed and small traffic Note: we assume that agents are queried in parallel (all neighbors are contacted in one step) but the system is asynchronous

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 12 Performance model Two cases:  The content of the cache is assumed to be completely random  Hot spots (resources requested frequently) appear in a large number of caches: In a fraction h of all caches (h ≤ 1)  N nodes, R resources, k cache size  Steady state: all caches full

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 13 Performance analysis, preliminaries PC (1): Probability of finding x in any given cache Random Requests In Nk total entries, each resource appears Nk/R times avg., or in a portion of (Nk/R)/N = k/R of the caches. Thus, the probability of locating a specific resource in a specific cache is: PC(1) = k/R PC(1) = 1 – a R, with a R = 1 – k/R Hot Spots Each hot spot appears in a fraction h of all caches, let r h portion of hotspots (1-r h )R cold-spots For hotspots, PC(1) = h, PC(1) = 1 –a H, with a H = 1 –h For coldspots, PC(1) = 1 – a C, with a C =

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 14 Performance analysis, preliminaries For j caches, PC(j) = 1 – (1 – PC(1)) j = 1 – a j If s i is the prob. of locating the resource in exactly the i-th step, then: Given the resource is found, the average number of steps is:

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 15 Contacts all neigbors (entries in cache) Complete k-ary “tree” Exponential # messages, relatively small # steps Flooding A1 A2A4 A3A5A6A3

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 16 Performance of flooding In each level of the “tree” k i caches are queried Approximation: all these caches are distinct (does not introduce significant error) Locating resource at exactly step i :

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 17 Performance of flooding, cont. Obtained: Messages: if not in root’s cache, we get k transmissions plus all messages within the k subtrees: k m(t – 1)

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 18 Performance of flooding, cont. For each of the k subtrees, Solving recursion gives: Exponential # messages, as expected

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 19 Performance of flooding, cont.

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 20 Performance of flooding, cont.

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 21 Performance of flooding, cont.

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 22 Teeming (randomized flooding) A1 A2A4 A3A6A3  Intermediate nodes ask a random subset of their neighbors: A node asks each neighbor with probability φ, kφ neighbors asked on average  φ = 1 is flooding

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 23 Performance of teeming Similarly, obtained : Exponential slower than flooding, based on φ

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 24 Random paths Inquiring node asks p neighbors Intermediate nodes ask 1 neighbor (similar to concurrent DFS) Fewer messages, more steps A1 A2A4 A5A3 p = 2 paths

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 25 Performance of random paths Obtained, for p paths:

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 26 Comparison of algorithms, 1 – Q Teeming with φ = 1/sqrt(k) Random resource

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 27 Comparison of algorithms, S Random resource

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 28 Comparison of algorithms, M Random resource

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 29 Comparison of algorithms, 1 - Q Hotspots

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 30 Comparison of algorithms, S Hotspots

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 31 Comparison of algorithms, M Hotspots

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 32 Comparison, discussion Flooding and teeming depend on k, random paths on the ratio k/R Flooding and teeming yield higher probabilities of discovering the resource, and with fewer steps; However the number of messages, esp. for flooding is excessive Teeming can balance performance with appropriate selection of φ Few paths are bad; for 4 paths probability and # steps is more than acceptable, # messages is minimal Cache vary efficient for hotspots Simple optimizations: cycles, periodically contact the inquiring agent (else search continues even if the resource is found)

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 33 Simulation Simulators for all algorithms constructed 200 to 500 resources 1000 to 5000 agents/caches Initially all caches filled randomly Search for a uniformly random resource, 1000 repetitions Analysis confirmed with negligible error (less than 0.5% in most cases)

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 34 Simulation & theory Random resources

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 35 Simulation & theory, cont. Random resources

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 36 Simulation & theory, cont. Random resources

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 37 Simulation & theory, cont. Random resources

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 38 Simulation & theory, cont. Hotspots

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 39 Updates Type of updates (1) Agent offers a new resource or cease to offer a resource (2) The contact information of an agent changes (e.g., it moves) Discuss case 2 above – decentralized solution

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 40 Updates, inverted cache  Each agent maintains which agent know about it  Use the inverted cache to inform other agents

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 41 Updates, flooding  When an agent moves, it informs the agent in its cache and so on  Neighbor relationship is not symmetric, A knows B, B may not know A

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 42 Summary A new scheme for open MAS: a distributed cache network Decentralized unstructured p2p resource discovery Algorithms proposed: classical flooding, teeming (randomized flooding), random paths Performance study of searching: analytical models for probability of locating, average # steps, average # messages Cache updates

CIA 03 Dimakopoulos & Pitoura - University of Ioannina 43 Future Work  Prototype implementation (In progress) implementation in the Aglets platform completed experimental evaluations under way  Updates/Mobility (In progress) Performance evaluation  Caches evolve over time Cache replacement issues  Extend performance evaluation Random/Hot spots -> Small world network of caches

QUESTIONS? A Peer-to-Peer Approach to Resource Discovery in Multi-Agent Systems