An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance.

Slides:



Advertisements
Similar presentations
COMPUTER NETWORK TOPOLOGIES
Advertisements

Computer Network Topologies
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Reducing Network Latency Paul Johnson CPSC APRIL 05 Using an Intelligent Service to Determine the Cheapest Communications Path.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Traffic Engineering With Traditional IP Routing Protocols
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
HyperCuP – P2P Network Boyko Syarov. 2 Outline  HyperCup: What is it?  Basic Concepts  Broadcasting Algorithm  Topology Construction  Ontology Based.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Decentralized resource management for a distributed continuous media server Cyrus Shahabi and Farnoush Banaei-Kashani IEEE Transactions on Parallel and.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Internet Networking Spring 2002
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Diameter Agent Overload IETF 88 - Vancouver 1. Goal Get consensus from the working group that Agent overload needs to be addressed If so, get guidance.
Sensor Networks Storage Sanket Totala Sudarshan Jagannathan.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Packet-Switching Networks Routing in Packet Networks.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Scalable Overlay Network for Peer-to-Peer File Sharing Park, Chanmo Networked Media Lab. Kwang-Ju.
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 Towards Taxonomy-based Routing in P2P Networks Alexander L¨oser 指導老師 : 許子衝 老師 學生 : 羅英辰 學號 :M97G0216.
Networking and internetworking devices. Repeater.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Advanced Computer Networks: Part 2 Complex Networks, P2P Networks and Swarm Intelligence on Graphs.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Computer Network Topologies
Peer-to-Peer Data Management
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
COMP 3270 Computer Networks
CHAPTER 3 Architectures for Distributed Systems
Internet Networking recitation #12
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Presentation transcript:

An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance of Mr. P. Barath Asst.Prof, SCS Vellore Institute of Technology

Definition A distributed architecture consisting of a collection of resources performing a distributed function is called a peer to peer architecture. P2P computing is the sharing of computer resources and services by direct exchange between systems.

Aim To effectively use peers to share their content with topologically closer peers. To reduce the number of redundant messages in the network without compromising on the search performance. To effectively utilize the topology of the underlying network to increase the performance of the query routing algorithm.

C A B Problem with the content search strategies in the network Packet

Approach To design a new algorithm for converting any physical network into a conceptual network. To implement a new query routing algorithm in the derived conceptual network to locate data present in the actual physical network.

Proposed System Architecture Peers in the system act as client peers and super-peers in different hierarchies. Super-peers act as local search hubs, proxying search requests on behalf of these peers. Super-peers are connected with each other and organized amongst themselves into a backbone overlay network on the super-peer tier.

Multi-tier Architecture

Advantages of Proposed Architecture The hierarchical structure of this system combines advantages of both centralized and pure P2P systems. It combines the efficiency of a centralized search with the Autonomy Load balancing and Robustness provided by the distributed search mechanisms.

Advantages of Proposed Architecture (Contd...) The proposed architecture distributes the load on the central server to many super-peers. No single super-peer is required to handle a very large load. Nor will one peer become a bottleneck or a point of failure for the entire system.

Selection of Nearest Super-peer Let dist(p,q) represent the underlying distance between peers p and q. Let dist RTT (p,q) to represent the detected RTT value and dist TTL (p,q) to represent the detected TTL value. Let d be a predefined value to denote the latency difference of two paths.

Selection of Nearest Super-peer (Contd...) Given peers p, q, s, t then the distance can be compared using the following concept: If |dist RTT (p,q)- dist RTT (s,t)|>d then If dist RTT (p,q)≥ dist RTT (s,t) then dist(p,q)> dist(s,t) Else dist(p,q)< dist(s,t) Else If dist TTL (p,q)≥ dist TTL (s,t) then dist(p,q)> dist(s,t) Else dist(p,q)< dist(s,t)

The Proposed Neighbour Information Based Algorithm * A i : The identifier of peer i. *hop t : the network distance that is t hops distance from the specific central peer. *Nbr(A i, hop t ): The neighbour set of Ai, and the shortest distance between peers in the set and A i is exact t hops. *Unnecessary message: The repeated flooding query message received by a peer.

Rules for Predicting Unnecessary Messages A i is father of A j, that is to say A j has received message from A i. A j will send the message to its neighbours (A k ) except A i. Then A j can predict that other peers may also send the messages to A k, define these peers (including A j ) as Possible Father Set (PFS) of A k, expressed as : PFS(A i, A j, A k )={Nbr(A k, hop 1 ) Nbr(A i, hop 1 )}

Unnecessary Message prediction Rules Rule 1: if A k Nbr(A i, hop 1 ), then Msg(A j, A k ) must be unnecessary message. Rule 2: if A k Nbr(A i, hop 1 ), and PFS(A i, A j, A k ) ≠ {A j }, then Msg(A j, A k ) is possible unnecessary message, or else it is necessary message.

Proposed Neighbour Information Based Routing Algorithm Step1: If A i has received the query before, drop the query. Step2: If the query is satisfied, then return results to sponsor. Step3: If TTL is not more than zero, drop the query.

Proposed Neighbour Information Based Routing Algorithm (Contd...) Step4: For each A j Nbr(A i, hop 1 ), predicts the validity of Msg(A i,A j ) by UMP. If it is a necessary message, then send it to A j ; if it is unnecessary message; do not send it; if it is a “possible” unnecessary message judged by UMP Rule2 then do not send it.

Advantages of The Proposed Approach This algorithm does not reduce the search scope of the general flooding algorithm. The node utilizes only its local NIT. No wastage of time in exchanging information between nodes to decide the valid neighbours. Retrieving information from local database is around five times faster than exchanging topology information

Conclusion Our simulations suggest that unnecessary messages make up to 27% in different kinds of network topologies algorithm attains an efficiency of 73% of necessary messages.