UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project

Slides:



Advertisements
Similar presentations
Optimal Resource Discovery Paths of Gnutella2 The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)
Advertisements

UNIVERSITY OF JYVÄSKYLÄ Chedar: Peer-to-Peer Middleware Presentation for 8 th International Workshop on Java tm for Parallel and Distributed Computing.
UNIVERSITY OF JYVÄSKYLÄ P2PStudio – Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research Presentation for PM 2 HW 2 N on 2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
UNIVERSITY OF JYVÄSKYLÄ P2PDisCo – Java Distributed Computing for Workstations Using Chedar Peer-to-Peer Middleware Presentation for 7 th International.
UNIVERSITY OF JYVÄSKYLÄ New Topology Management Algorithms for Unstructured P2P Networks Presentation for The Second International Workshop on P2P Systems.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Traffic Engineering With Traditional IP Routing Protocols
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
UNIVERSITY OF JYVÄSKYLÄ Power-law Networks InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Researcher.
UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
UNIVERSITY OF JYVÄSKYLÄ InBCT 3.2 Peer-to-Peer communication/computation Cheese Factory -project Prof., D.Sc. (EE)
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
UNIVERSITY OF JYVÄSKYLÄ Distributed computing in peer-to-peer environment InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Distributed data fusion in peer-to-peer environment Sergiy Nazarko, InBCT 3.2, Agora center, University of Jyväskylä.
 Idit Keidar, Technion Intel Academic Seminars, February Octopus A Fault-Tolerant and Efficient Ad-hoc Routing Protocol Idit Keidar, Technion Joint.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Algorithms and Prototypes in Jyväskylä Mikko Vapa, research student Department of Mathematical Information.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Diameter Agent Overload IETF 88 - Vancouver 1. Goal Get consensus from the working group that Agent overload needs to be addressed If so, get guidance.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation Baruch Awerbuch, David Holmer, Herbert Rubens {baruch dholmer WONS Jan.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Fast Searching in Peer-to-Peer Networks Self-Organizing Parallel Search Clusters Rocky Dunlap.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Layer 2 and Switching. How Computers Communicate  In a two node flat network data can be sent without addressing.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
1 Query-Flood DoS Attacks in Gnutella by Andreas Legrum based upon a paper by Neil Daswani and Hector Garcia-Molina.
Peer to Peer Network Design Discovery and Routing algorithms
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
Design of a Robust Search Algorithm for P2P Networks
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
William Stallings Data and Computer Communications
On Growth of Limited Scale-free Overlay Network Topologies
Internet Networking recitation #12
Plethora: Infrastructure and System Design
Researcher M.Sc. Mikko Vapa University of Jyväskylä
EEC – 289Q Project Presentation
Presentation transcript:

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant Annemari Auvinen University of Jyväskylä Agora Center

UNIVERSITY OF JYVÄSKYLÄ 2004 Hit values Active connections and history data contains –Hit values: Increased every time the node gets reply to resource query from the connection –Relayed hits Connection measures how many replies its neighbors have relayed

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 1/2 Peer moves closer to the ”good” peers Overtaking percent If connection has neighbor which relayed hits proportion of all neighbors relayed hits and connection’s hits is more than the given percent a new connection to that neighbor is established and current connection is dropt Hits:2 Relayed hits:6 (60%) Relayed hits:2 (20%)

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 2/2 Peers which provide lots of good resources are in the middle of the network Power-law network: a few nodes with many neighbors and a lot of nodes with a few neighbors -> fault tolerant and efficient topology for searching

UNIVERSITY OF JYVÄSKYLÄ 2004 Node Selection 1. Tries to establish the connections which the peer had before leaving the network 2. History data 1. Connections with hit values and ”old” request time 2. Connections with ”old” request time or unrequested connections

UNIVERSITY OF JYVÄSKYLÄ 2004 Node Removal Selects the ”worst” connection Worst connection is a connection which has the lowest goodness value Goodness value: – Connection’s hits + its neighbors’ relayed hits

UNIVERSITY OF JYVÄSKYLÄ 2004 Load estimation Connections are established and dropped based on the traffic amount flowing through the node ConnectionManager measures the traffic in the given time sequence and if it is more than the given traffic limit one connection is dropped by using Node Removal If the traffic meter is less than the limit, algorithm tries to establish a new connection by using Node Selection

UNIVERSITY OF JYVÄSKYLÄ Results

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 20%

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 20%

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 80%

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking 80%

UNIVERSITY OF JYVÄSKYLÄ 2004 Overtaking Overtaking percent 20% + gives power-law network + the biggest nodes provides a lot of resources -network doesn’t converge -> creating and dropping connections creates traffics and loads the network -Overtaking percent 80% + network converges + the biggest nodes provides a lot of resources - not power-law distributed network but some features of it

UNIVERSITY OF JYVÄSKYLÄ 2004 Load Estimation Traffic limit 60kB

UNIVERSITY OF JYVÄSKYLÄ 2004 Load Estimation

UNIVERSITY OF JYVÄSKYLÄ 2004 Interaction of Overtaking and Load Estimation Overtaking 80% and traffic limit 60kB

UNIVERSITY OF JYVÄSKYLÄ 2004 Interaction of Overtaking and Load Estimation

UNIVERSITY OF JYVÄSKYLÄ 2004 Future Testing in simulator with information about reply messages hops Peer’s goodness in relation to sent resource queries Topology management using a neural network for making Chedar adaptive in wide range of peer-to-peer networks