Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
Efficient Search - Overview Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003.
Improving Search in Peer-to-Peer Networks Beverly Yang Hector Garcia-Molina Presented by Shreeram Sahasrabudhe
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Conclusions in Peer-to-Peer Systems Παρουσίαση: Τάσος Καραγιάννης, Σπυριδούλα Μαργαρίτη, Κώστας Στεφανίδης, Θοδωρής Τσώτσος.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
IR Techniques For P2P Networks1 Information Retrieval Techniques For Peer-To-Peer Networks Demetrios Zeinalipour-Yazti, Vana Kalogeraki and Dimitrios Gunopulos.
1 P2P Querying Wes Hatch MUMT-614 Mar What is P2P? Nodes of equal roles exchanging information and services directly “distributed databases”
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Brocade Landmark Routing on P2P Networks Gisik Kwon April 9, 2002.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Othman Othman M.M., Koji Okamura Kyushu University 1.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
#16 Application Measurement Presentation by Bobin John.
Doc.: IEEE /2200r2 Submission July 2007 Sandesh Goel, Marvell et alSlide 1 Route Metric Proposal Date: Authors:
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
The Chord P2P Network Some slides taken from the original presentation by the authors.
Peer-to-Peer Information Systems Week 12: Naming
Peer-to-Peer Data Management
Peer-to-Peer and Social Networks
Early Measurements of a Cluster-based Architecture for P2P Systems
EE 122: Peer-to-Peer (P2P) Networks
Mobile and Wireless Networking
A Scalable content-addressable network
Aayush Patidar Ashwin Ramakrishnan Manoj Juneja
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid

Motivation File-sharing is most popular use of P2P networks For file-sharing, searching is the most important operation Structuring P2P networks for efficient searching has not been widely explored

Present P2P search methods Network Search method Disadvantage Gnutella BFS with TTL High network overhead KazaaSuper-nodes Processing and memory overhead borne by few nodes ChordNoneN.A.

BFS with TTL (Gnutella) Forward request to all neighbors Search file- system for matches Subtract 1 from TTL TTL > 0? END No Yes Start with TTL = 3 O (min (log N, TTL))

BFS with TTL AdvantagesDisadvantages No need for central server Search request may loop back Nodes share processing overhead Nodes which have no matches also participate in search Robust to nodes joining and leaving network Nodes may receive same request from alternate routes

Super-nodes (Kazaa) Forward request to nearest super-node Super-node searches central index of files shared by clients connected to it Forward request to all known super-nodes O (log N – log n)

Super-nodes AdvantagesDisadvantages No need for central server Search requests may loop back Nodes share processing overhead Search overhead shared by select nodes only Faster searches compared to BFS Not as robust to network changes

Problem Can we formulate a P2P network structure that is better adapted for searching ?

Desirable properties Efficient –No duplication from loop backs or alternate routes –Provide directed searches Robust –Minimally affected by network changes Adaptable –Restructures according to on-going activity

Stacked Virtual Search Rings One main network responsible for data lookup / transfer given resource ID On top of main network, construct stack of virtual ring networks that connect “similar” nodes based on some criteria for similarity Given a search request, find virtual network which most closely matches request and traverse it to find resource IDs

Stacked Virtual Search Rings Main network (Data transport) Virtual networks (Resource lookup)

Observations Generalized search structure model BFS with TTL method implemented by having a single VN connecting all nodes Super-nodes method implemented by having single VN linking all super-nodes

Elimination of duplication While forwarding request, indicate stop address Request will not be forwarded beyond stop address e.g. Request forwarded to 1 will not go beyond 19 Thus, no duplication

Directed searches If the criteria for similarity of a VN closely matches the search request, then all the nodes on that VN have a higher probability of finding a match than the nodes not on the VN  more directed search Example: If criteria for similarity is “Have a file starting with sequence ‘ab’”, and the search request is for ‘abc*’

Advantages Ring structure of networks prevents unnecessary duplication Traversing VNs allows for directed searches Network search structure adapts to on- going requests through restructure of VNs VN abstraction allows use of any underlying data transport network

New problem What criteria should be used to link nodes in a VN ?

Proposed solution Assign each VN a unique ID x 1 x 2 x 3 x 4, where each x i is an alphanumeric char Define surrounding nodes as all nodes within d hops from current node A node is elected to a VN x 1 x 2 x 3 x 4 by its surrounding nodes when a search request is received via pure flooding that matches at least 1 file on one of the surrounding nodes

Proposed solution All surrounding nodes send the list of files they have that match the sequence x 1 x 2 x 3 x 4 to the elected node The number of VNs that a node may be part of is limited to a reasonable quantity No keep alive messages are sent for the VN. The structure is verified only when a node is added or removed from a VN.

Operation The client node looks up its table to find matching VNs If none found, it locates VNs that match its search request (S) by doing a BFS with TTL A VN matches S if (*S* matches x 1 x 2 x 3 x 4 ) || (*x 1 x 2 x 3 x 4 * matches S) The client node forwards the request to a single node in each of the VNs it found Within the VNs, the nodes do a BFS with TTL to locate matching resources

Remarks VNs are constructed based on search requests and content available  adapts Localized “super-nodes” are elected  faster searching and load balancing Any node may be elected  all nodes participate in searches Surrounding nodes between neighboring “super-nodes” may overlap making system more robust to “super-nodes” leaving

Potential problems If a node is part of 2 VNs which both match S, then the node will get the same request twice Virtual networks may get fragmented due to lack of keep-alive messages

Future work Simulations need to be performed to verify and quantify reduction in search overhead Implementation details need to be analyzed and discussed in more depth

Conclusion Explored present solutions available Described SVSR method for structuring P2P networks to optimize searches Proposed a criteria for constructing VNs