UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.

Slides:



Advertisements
Similar presentations
UNIVERSITY OF JYVÄSKYLÄ Chedar: Peer-to-Peer Middleware Presentation for 8 th International Workshop on Java tm for Parallel and Distributed Computing.
Advertisements

UNIVERSITY OF JYVÄSKYLÄ P2PStudio – Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research Presentation for PM 2 HW 2 N on 2.
UNIVERSITY OF JYVÄSKYLÄ Mobile Chedar – A Peer-to-Peer Middleware for Mobile Devices Presentation for International Workshop on Mobile Peer-to- Peer Computing.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
UNIVERSITY OF JYVÄSKYLÄ P2PDisCo – Java Distributed Computing for Workstations Using Chedar Peer-to-Peer Middleware Presentation for 7 th International.
UNIVERSITY OF JYVÄSKYLÄ New Topology Management Algorithms for Unstructured P2P Networks Presentation for The Second International Workshop on P2P Systems.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
By: Asaf Oren & Gilad Eisenberger Supervisor: Ittay Eyal Spring 2009 Networked Software Lab.
JXTA P2P Platform Denny Chen Dai CMPT 771, Spring 08.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
UNIVERSITY OF JYVÄSKYLÄ Power-law Networks InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Researcher.
UNIVERSITY OF JYVÄSKYLÄ InBCT 3.2 Peer-to-Peer communication/computation Cheese Factory -project Prof., D.Sc. (EE)
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
UNIVERSITY OF JYVÄSKYLÄ Distributed computing in peer-to-peer environment InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Distributed data fusion in peer-to-peer environment Sergiy Nazarko, InBCT 3.2, Agora center, University of Jyväskylä.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Algorithms and Prototypes in Jyväskylä Mikko Vapa, research student Department of Mathematical Information.
JYVÄSKYLÄN YLIOPISTO 2003 InBCT 3.2 M.Sc. Sergiy Nazarko Cheese Factory –project Distributed Data Fusion In Peer2Peer Environment
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Network Topologies.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
IR Techniques For P2P Networks1 Information Retrieval Techniques For Peer-To-Peer Networks Demetrios Zeinalipour-Yazti, Vana Kalogeraki and Dimitrios Gunopulos.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
The InetAddress Class A class for storing and managing internet addresses (both as IP numbers and as names). The are no constructors but “class factory”
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
1 Query-Flood DoS Attacks in Gnutella by Andreas Legrum based upon a paper by Neil Daswani and Hector Garcia-Molina.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Peer to Peer Network Design Discovery and Routing algorithms
UNIVERSITY OF JYVÄSKYLÄ UBIWARE Nokia Research Center Case Meeting on Mikko Vapa, research student P2P Computing Group Department of Mathematical.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Alexander Smithson, Dian Ding, Yeh Cheng Yuan Graduate Advisor: Eric Liao Faculty.
Project JXTA Kaarthik Sivashanmugam. JXTA..? JXTA is a set of open, generalized peer-to-peer (P2P) protocols that allow any connected device on the network.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
CHAPTER 3 Architectures for Distributed Systems
Chat Refs: RFC 1459 (IRC).
Researcher M.Sc. Mikko Vapa University of Jyväskylä
Presentation transcript:

UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant Annemari Auvinen University of Jyväskylä Agora Center

UNIVERSITY OF JYVÄSKYLÄ 2003 Generally Chedar is a Peer-to-Peer(P2P) platform for searching resources from the distributed network Resources can be i.e. computing power or files Distributed system without any central points P2P Applications Chedar IP TCP Network Chedar TCP

UNIVERSITY OF JYVÄSKYLÄ Architecture

UNIVERSITY OF JYVÄSKYLÄ 2003 Components 1/3 ChedarClient –Control interface of a Chedar node –Applications and user interfaces communicate with Chedar through the ChedarClient –Used by P2PStudio, data fusion and distributed computing applications Chedar ChedarClient P2PStudio, Data Fusion, Distibuted Computing

UNIVERSITY OF JYVÄSKYLÄ 2003 Components 2/3 ConnectionManager –Manages active connections and history data –Forwards received messages to the right component –Measures traffic: Traffic limit and meter -> Overload TopologyManager –Makes decisions which connections are dropped and where to establish a new connection –Optimizes the topology locally

UNIVERSITY OF JYVÄSKYLÄ 2003 Components 3/3 PropagationEngine –Handles the resource queries and replies Connection –Represents the TCP connection to neighboring Chedar node

UNIVERSITY OF JYVÄSKYLÄ 2003 Connections Chedar keeps a track of active and earlier connections Active connections and history data contains –Number of the neighbors –Hit values: One is increased every time the node gets reply to resource query Actual hits is increased when node selects to use the neighbor’s resource Verified hits is added when node wants to give feedback to used resource –Relayed hits Connection measures how many replies their neighbor has relayed

UNIVERSITY OF JYVÄSKYLÄ 2003 Messages Topology management messages – Connection requests and replies – NeighborList requests and replies – ServiceList requests and replies Resource requests and replies

UNIVERSITY OF JYVÄSKYLÄ 2003 Resource discovery algorithms Breadth-First Search algorithm –Query is forwarded to all node’s neighbors if there is time-to- live value left –When resource is found the node sends the reply NeuroSearch –Uses neural network for forwarding decisions Other algorithms currently under implementation –Highest degree search –Random walker –Adaptive Breadth-First Search

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms

UNIVERSITY OF JYVÄSKYLÄ 2003 Overtaking 1/2 Peer moves closer to the ”good” peers Overtaking percent If connection has neighbor which relayed hits proportion of all neighbors relayed hits and connection’s hits is more than the given percent a new connection to that neighbor is established and current connection is dropt Hits:2 Relayed hits:6 (60%) Relayed hits:2 (20%)

UNIVERSITY OF JYVÄSKYLÄ 2003 Overtaking 2/2 Peers which provide lots of good resources are in the middle of the network Power-law network: a few nodes with many neighbors and a lot of nodes with a few neighbors -> fault tolerant and efficient topology for searching

UNIVERSITY OF JYVÄSKYLÄ 2003 Node Selection 1. Tries to establish the connections which the peer had before leaving the network 2. History data 1. Connections with hit values and ”old” request time 2. Connections with ”old” request time or unrequested connections

UNIVERSITY OF JYVÄSKYLÄ 2003 Node Removal Selects the ”worst” connection Worst connection is a connection which has the lowest goodness value Goodness value: connections hits+its neighbors relayed hits

UNIVERSITY OF JYVÄSKYLÄ 2003 Overload estimation Connections are established and dropped based on the traffic amount flowing through the node ConnectionManager measures the traffic in the given time sequence and if it is more than the given traffic limit one connection is dropped by using Node Removal If the traffic meter is less than the limit, algorithm tries to establish a new connection by using Node Selection

UNIVERSITY OF JYVÄSKYLÄ 2003 Resource reply ”routing” Reply goes back to sender same route as it came if all nodes are still available If the node where the query came to the node is not available anymore the reply is tried to sent to the previous node If the previous node is not available the reply is sent directly to the sender Peer 3Peer 2 Peer 1 Peer 4 query reply

UNIVERSITY OF JYVÄSKYLÄ 2003 Future Point-to-Point Protocol to enable two peer-to- peer nodes to communicate with each other Topology management using a neural network for making Chedar adaptive in wide range of peer-to-peer networks New search algorithms for studying the performance of local search algorithms and the NeuroSearch