P2P Group Meeting (ICS/FORTH) Monday, 21 February, 2005 Making Gnutella-like P2P Systems Scalable (Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Intel Research Seattle Sylvia Ratnasamy, Lee Breslau, Scott Shenker, and Nick Lanham.
CS 408 Computer Networks Congestion Control (from Chapter 05)
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Antonis Papadogiannakis
Improving Gnutella Willy Henrique Säuberli Seminar in Distributed Computing, 16. November 2005 Papers: I.Making Gnutella-like P2P Systems Scalable; SIGCOMM.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Making Gnutella-like P2P Systems Scalable Presented by: Karthik Lakshminarayanan Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, and Scott.
P2P Course, Structured systems 1 Introduction (26/10/05)
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 - CS7701 – Fall 2004 Review of: Making Gnutella-like P2P Systems Scalable Paper by: – Yatin Chawathe (AT&T) –Sylvia Ratnasamy (Intel) –Lee Breslau (AT&T)
Chapter 12 Routing in Switched Networks. Routing in Packet Switched Network  key design issue for (packet) switched networks  select route across network.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau (Several slides have been taken.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau Parts of it has been adopted from.
On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks Presenter: 游創文.
"A Measurement Study of Peer-to-Peer File Sharing Systems" Stefan Saroiu, P. Krishna Gummadi Steven D. Gribble, "A Measurement Study of Peer-to-Peer File.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
An overview of Gnutella
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Peer to Peer Network Design Discovery and Routing algorithms
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Marco Conti, Enrico Gregori, Giovanni Turi Istituto di Informatica e Telematica – CNR MobiHoc ‘ Jongsoo Lee
Unstructured Networks: Search Márk Jelasity. 2 Outline ● Emergence of decentralized networks ● The Gnutella network: how it worked and looked like ● Search.
William Stallings Data and Computer Communications
Peer-to-Peer and Social Networks
GIA: Making Gnutella-like P2P Systems Scalable
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Congestion Control (from Chapter 05)
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

P2P Group Meeting (ICS/FORTH) Monday, 21 February, 2005 Making Gnutella-like P2P Systems Scalable (Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker)

GIA * A collection of properties which aims to increase scalability and system capacity in decentralized P2P networks, similar to Gnutella. * Gia is a short for giandiuia, which is the generic name for the hazelnut spread, Nutella. What is all about?

GIA Properties ● Dynamic topology adaptation algorithm ● Active flow control, based on tokens ● One-hop replication of pointers to content ● Search mechanism based on biased random walks

(1) Topology Adaptation An algorithm that creates a specific topology schema for peer connections. The final goal is to build a network topology which ensures that high-capacity peers have high degrees (more stable nature in the system) and low-capacity peers are within short reach of high-capacity ones. ● Capacity is transmitted during the handshake phase and in PONG packets. ● Capacity is based only on a peer's available bandwidth and on a peer's life-time in the network. ● Capacity is normalized by the peer's degree value.

How it works? Let S ∈ [0,1] to be a peer's satisfactory level. S grows linear from 0 (dissatisfied) to 1 (fully satisfied). Each peer tries to increase its S by picking peers from its cache and connecting to them. Let X, Y, Z to be abstract peers in the network. ● X picks to connect to Y which optimally has higher capacity than X. ● Y welcomes X if Y's neighbors are less than max_nbrs-H (H=5), otherwise Y is free to decide. ● X may drop an already established connection in favor of Y. ● X always drops the highest-degree neighbor Z, the one that has less to loose from X. ● Z is dropped only if Y has at least H fewer neighbors than Z.

Capacity-Degree Contribution Consider X, Y, Z peers. Y, Z have C capacity. Assume Dy, Dz are Y's and Z's degrees respectively. Denote that Dz < Dy. Z has higher contribution to X's S than Y. A peer with capacity C will forward approximately C queries per unit time at full load and needs enough outgoing capacity from all of its neighbors to handle the load.

Why? A topology that forces low-capacity peers to be in short range of high-capacity (with high degrees) ones optimizes random-walk based search. High-capacity peers are better candidates to handle successfully a query, since they have the needed bandwidth.  Do not confuse Ultrapeers with Gia's Topology Adaptation algorithm. The latter is not binary!

(2) Flow Control Gia's peers periodically transmit query-acceptance tokens. X peer can forward a search query in Y peer only if X has received a token from Y. Gia's flow control eliminates query packet dropping, which is vital because it uses random-walk based search. Token assignment is relevant to each peer's capacity. A Start- time Fair Queuing (SFQ) implementation is used.

(3) One-hop Replication Each peer maintains pointers (exchanged during the establishment of a new connection) of its neighbors' content. Special care must be taken in order the pointers to be always updated. Some thoughts exist to extend this property in order to have one-hop physical content's replication.

(4) Search Protocol Gia's search protocol is a biased random-walk: forward a query to the highest capacity peer for which you have flow-control tokens available. Each query packet has a MAX_RESPONSES field, with a TTL- compliant behavior. Returned Query Hits are assumed as implicit keep-alive of the query. An empty Query Hit packet is returned explicitly when the query reach the final peer.

Simulation Gia is compared with: ● FLOOD: Original Gnutella model. ● RWRT: Searching using random-walks over random topologies. ● SUPER: Searching in Ultrapeer compliant networks.

Model – Capacity Distribution Based on a Gnutella report (Saroiu et al.).

Model – Query rate Let C i to be the peer's capacity representing the number of messages that it can process per unit time. Let q i to be: the number of queries that peer i generates per unit time. All peers have the same q bounded by their capacity.  Assume infinite length incoming/outgoing buffer queues.

Model – Other properties ● Queries are keyword based. ● Constant replication factor (rf of 1% implies that a query produces a hit in 1% peers of the system) in each simulation run. Topology/TTL ● Gia: Initial random graph but with topology adaptation. TTL=1024. min_nbrs = 3, max_nbrs = min(max_nbrs, Capacity/min_alloc), min_alloc = 4, max_nbrs = 128. ● RWRT: Random graph. TTL=1024. Average degree = 8. ● FLOOD: Random graph. TTL=10. Average degree = 8. ● SUPER: Random graph for supernodes. Ordinary nodes connect randomly to one supernode. TTL=10.

Performance Metrics Success Rate: the fraction of queries issued that successfully located the desired content. Hop-count: the number of hops required to locate the desired content. Delay: the time taken by a query from start to finish.  Please, see figure 2. Final Metrics Collapse Point (CP): the per node query rate at the knee, which we define as the point beyond which the success rate drops below 90%. This metric reflects total system capacity. Hop-count before collapse (CP-HC): the average hop-count prior to collapse. Ideal Case: a system with high success rate and low hop- count/delay.  There is no delay metric, since delay is effectively captured by the collapse point.

Performance Comparison Single Search (i.e. MAX_RESPONSES = 1)  Please, see Figure 3, 4. System Capacity in Gia is 3 to 5 orders of magnitude higher than FLOOD/RWRT. Gia copes better than SUPER.

Performance Comparison Multiple Search Results (i.e. MAX_RESPONSES >= 1)  Please, see Table 2, 3. A query for k MAX_RESPONSES at a replication factor of r is equivalent to a query for a single response at replication factor of r/k.

Removing/Adding Components  Please, see Table 4. Each property has no linear contribution to the performance achieved by the combination.  Removing the OHR property from Gia drops the CP manifestly, but it does not so while adding the property in RWRT.

Other Performance Issues Heterogeneity is vital for Gia.  Please, see Table 5. Let MAXLIFETIME = 10 time units. I.e. 20% of the peers reset in every time unit (a typical Gnutella peer has life time of 60 minutes). Performance drops by less than order of magnitude even in high churn rates.  Please, see Figure 5, 6.

Technical Details Let T to be the maximum interval between adaption operations. Let K to be an integer representing aggressiveness of topology adaptation. Adaption Interval: I = T × K -(1-S). If S < 1.0 then topology adaption is performed every I seconds. If S = 1.0 then a check for S is performed every T seconds.  Please, see Figure 8, 9. For the PlanetLab experiment T = 10 secs.

☺ Most of the extensions have algorithmic nature. ☺ Smart use of the ad hoc heterogeneity of open decentralized networks. ☹ Some parts of the extensions need packet modification (MAX_RESPONSES, capacity/degree transmition). ☹ Topology adaptation might be a heavy operation in the real world (thousands of peers, real TCP/IP handshakes, etc.). ☹ Everyone must play by the rules. ☹ Possible race during the handshake phase. Remarks, IMHO

Thank you for your time! :-) Elias Athanasopoulos  ((TTL % 2) == 0) ? broadcast() : rndwalk();