UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on 22.3.2007 Annemari Auvinen, Research Student.

Slides:



Advertisements
Similar presentations
Optimal Resource Discovery Paths of Gnutella2 The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)
Advertisements

UNIVERSITY OF JYVÄSKYLÄ Chedar: Peer-to-Peer Middleware Presentation for 8 th International Workshop on Java tm for Parallel and Distributed Computing.
UNIVERSITY OF JYVÄSKYLÄ P2PRealm – Peer-to-Peer Simulator Presentation for 11 th International Workshop on Computer- Aided Modeling, Analysis and Design.
UNIVERSITY OF JYVÄSKYLÄ P2PStudio – Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research Presentation for PM 2 HW 2 N on 2.
UNIVERSITY OF JYVÄSKYLÄ Mobile Chedar – A Peer-to-Peer Middleware for Mobile Devices Presentation for International Workshop on Mobile Peer-to- Peer Computing.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
UNIVERSITY OF JYVÄSKYLÄ Mobile Encounter Networks and Their Applications 1 st IEEE International Peer-to-Peer for Handheld Devices Workshop IEEE CCNC,
UNIVERSITY OF JYVÄSKYLÄ P2PDisCo – Java Distributed Computing for Workstations Using Chedar Peer-to-Peer Middleware Presentation for 7 th International.
UNIVERSITY OF JYVÄSKYLÄ New Topology Management Algorithms for Unstructured P2P Networks Presentation for The Second International Workshop on P2P Systems.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in A Social Network Presentation for P2P content and distribution seminar of ICTSHOK Future Internet
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
UNIVERSITY OF JYVÄSKYLÄ InBCT 3.2 Peer-to-Peer communication/computation Cheese Factory -project Prof., D.Sc. (EE)
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
UNIVERSITY OF JYVÄSKYLÄ Distributed computing in peer-to-peer environment InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Database caching in MANETs Based on Separation of Queries and Responses Author: Hassan Artail, Haidar Safa, and Samuel Pierre Publisher: Wireless And Mobile.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Algorithms and Prototypes in Jyväskylä Mikko Vapa, research student Department of Mathematical Information.
Department of Computer Engineering Koc University, Istanbul, Turkey
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Network Topologies.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Dominating Set Based and Power-aware Hierarchical Epidemics in P2P Systems Tugba KocEmrah CemOznur Ozkasap Department of Computer Engineering, Koç University,
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
Efficient Content Sharing Taking Account of Updating Replicas in Hybrid Peer-to-Peer Networks Tatsuru Kato, Shinji Sugawara, Yutaka Ishibashi Nagoya Institute.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
UNIVERSITY OF JYVÄSKYLÄ UBIWARE Nokia Research Center Case Meeting on Mikko Vapa, research student P2P Computing Group Department of Mathematical.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks PAPER WRITTEN BY: LEONARDO B. OLIVEIRA, ISABELA G. SIQUEIRA,
OBJECT LOCATION IN UNSTRUCTURED P2P NETWORKS USING RANDOM WALK
On Growth of Limited Scale-free Overlay Network Topologies
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Presentation transcript:

UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student Department of Mathematical Information Technology

UNIVERSITY OF JYVÄSKYLÄ 2007 Content Topology Management Topology Management Algorithms Chedar and P2PRealm simulator NeuroTopology Future

UNIVERSITY OF JYVÄSKYLÄ 2007 Topology Management 1/2 Logical (i.e. overlay) topology on top of the physical network In an unstructured network a node's place in the network is not pre-defined like it is in a structured network A node may join the network by establishing a connection to another node on the P2P network

UNIVERSITY OF JYVÄSKYLÄ 2007 Topology Management 2/2 Topology management algorithms affect the topology by making network more scalable and effective for resource discovery Nodes are placed so that they stay connected and find resources efficiently without using too much of their capacity for being in the network Network can be kept connected Self-organizing using local information

UNIVERSITY OF JYVÄSKYLÄ 2007 Topology Management Algorithms Are based on the goodness of the node A good neighbor node provides resources to the node Goodness is sum of –The amount of the resource replies the node has got from the neighbor and –The amount of the resource replies the neighbor’s neighbor has relayed to the node

UNIVERSITY OF JYVÄSKYLÄ 2007 Node Selection and Node Removal Node searches a node to which to establish a new connection from the history based on hit values and request information Removed node is the ”worst” neighbor Worst neighbor is a node which has the lowest goodness value

UNIVERSITY OF JYVÄSKYLÄ 2007 Overload Estimation Connections are established and dropped based on the traffic amount flowing through the node If the traffic meter value is more than the given traffic limit one node is dropped by using Node Removal If the traffic meter value is less than the given lower traffic limit, algorithm tries to establish a connection to new node by using Node Selection

UNIVERSITY OF JYVÄSKYLÄ 2007 Overtaking Node moves closer to the ”good” nodes If neighbor has neighbor whose relayed hits proportion of all neighbor’s neighbors’ relayed hits and neighbor’s hits is more than the given percent node establishes a new connection to that node and current connection to the neighbor is dropped Hits:2 Relayed hits:6 (60%) Relayed hits:2 (20%)

UNIVERSITY OF JYVÄSKYLÄ 2007 Results Best combination of parameters: lower traffic limit 40%, 80% overtaking, traffic limit over 350 messages/50 sent messages Amount of changes in the network was small, topology got balance, neighbor distribution was power law and number of hops small

UNIVERSITY OF JYVÄSKYLÄ 2007 Chedar Decentralized P2P middleware implemented using Java Basis for P2P applications: distributed computing (P2PDisCo), data fusion, extension for mobile devices Includes the topology management algorithms, but because of errors in connections and machines affect results -> algorithms were implemented and tested in P2PRealm simulator

UNIVERSITY OF JYVÄSKYLÄ 2007 NeuroTopology Topology construction using neural networks The idea is that every peer has a neural network to make decisions about establishing new connections in a P2P network NeuroTopology algorithm is executed in every peer after a predefined amount of resource queries The algorithm goes through all neighbor candidates The information that the neural network needs, is gathered during resource queries

UNIVERSITY OF JYVÄSKYLÄ 2007 Inputs Bias = 1. CurrentNeighborsAmount is the number of node's neighbors ToNeighborsAmounts is the number of node's candidate neighbor’s neighbors RepliesFromCandidates is the number of the resource replies received from a candidate neighbor RelayedRepliesFromCandidates is the number of the resource replies which the candidate neighbor has relayed to the node TrafficMeter is a counter, which calculates the amount of the resource reply messages going through a node TrafficLimit simulates the bandwidth of a candidate node. If TrafficMeter value is bigger than Trafficlimit, the node will not reply to resource requests

UNIVERSITY OF JYVÄSKYLÄ 2007 Training The weights of the neural network have to be optimized Evolutionary computing and Gaussian random variation were used Define the P2P network conditions Define the fitness requirements for the algorithm Create candidate algorithms randomly Select the best ones for next generation Breed a new population Finally select the best algorithm for these conditions Iterate thousands of generations

UNIVERSITY OF JYVÄSKYLÄ 2007 Fitness of the neural network The fitness function takes into account –The number of resource queries –The number of resource replies –The number of the packets the topology query used –The number of the new connections, i.e. topology changes

UNIVERSITY OF JYVÄSKYLÄ 2007 Results

UNIVERSITY OF JYVÄSKYLÄ 2007 Future NeuroTopology: comparing the results with other algorithms Bayesian Networks and Petri Nets in Topology Management

UNIVERSITY OF JYVÄSKYLÄ 2007 References Auvinen A., Vapa M., Weber M., Kotilainen N., Vuori J., "Chedar: Peer-to-Peer Middleware", Proceedings of the 19th IEEE International Parallel & Distributed Processing Symposium (IPDPS 2006), Rhodes Island, Greece, Kotilainen N., Vapa M., Keltanen T., Auvinen A., Vuori J., "P2PRealm - Peer-to-Peer Network Simulator", 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD'06), IEEE Communications Society, pp , Trento, Italy, Auvinen A., Vapa M., Weber M., Kotilainen N., Vuori J., ”New Topology Management Algorithms for Unstructured P2P Networks”, to be published in the Second International Conference on Internet and Web Applications and Services, May Auvinen A., Keltanen T., Vapa M., ”Topology Management in Unstructured P2P Networks Using Neural Networks”, submitted to IEEE Congress on Evolutionary Computation, March 2007.