N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Structured P2P Network for Loop Avoidance Chanmo Park August 27, 2003

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

Virtual Trunk Protocol
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
An Overview of Peer-to-Peer Sami Rollins
Interconnection: Switching and Bridging
Multihoming and Multi-path Routing
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Peer-to-peer and agent-based computing P2P Algorithms.
Peer-to-peer and agent-based computing P2P Algorithms & Issues.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Peer-to-Peer and Social Networks An overview of Gnutella.
Chapter 1: Introduction to Scaling Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
1 Introduction to Network Layer Lesson 09 NETS2150/2850 School of Information Technologies.
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
1 12/18/ :21 Chapter 12Bridges1 Rivier College CS575: Advanced LANs Chapter 12: Bridges.
Connecting LANs, Backbone Networks, and Virtual LANs
A SMALL TRUTH TO MAKE LIFE 100%
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Introduction of P2P systems
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Scalable Overlay Network for Peer-to-Peer File Sharing Park, Chanmo Networked Media Lab. Kwang-Ju.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Peer-to-Peer and Social Networks
A Scalable content-addressable network
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
IP Multicast COSC /5/2019.
Presentation transcript:

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Structured P2P Network for Loop Avoidance Chanmo Park August 27, 2003

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 2/26 Contents What is P2P? Essentials of P2P Sharing Approaches toward P2P Sharing (gnutella, Kazza, Morpheus and CAN) Challenges Approach to Structured P2P Network Overview of Structured P2P Network Elements of Structured P2P Network Details of Structured P2P Network Conclusion References

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 3/26 What is P2P? Direct access between peer computers, rather than through a centralized server Applications that take advantage of resources (storage, cycles, content, human presence) available at the edges of the internet Offers a way of decentralizing administration on the resources Sharing of computer resources by direct exchange Self-organizing capacity

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 4/26 Essentials of P2P Sharing Construction of P2P Network oSelf-Organization Decentralized Resource Administration oSharing resources Content Discovery Stability oRecovery from the failure

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 5/26 Approaches toward P2P Sharing Unstructured network and pure decentralized oGnutella Unstructured network and partially decentralized oKazza, Morpheus Structured network and pure decentralized oCAN

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 6/26 Gnutella Protocol for P2P File Sharing(1) Characteristics oGnutella is a distributed system for file sharing provide means for network discovery provide means for file searching and sharing oDefines a network at the application level oEmploys the concept of peer-to-peer all hosts are equal (symmetry) there is no central point oanonymous search, but reveal the IP addresses when downloading

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 7/26 Gnutella Protocol for P2P File Sharing(2) Network Discovery oA discovers its horizon (e.g., TTL = 2) send ping to its neighbors (broadcast) ping msg is forwarded if TTL>0 oReceiving ping, B,C and E, respond pong pong contains network info about its sender B forwards pong msgs from E and C, to A

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 8/26 Gnutella Protocol for P2P File Sharing(2) Network querying oA searches the network (e.g., TTL = 2) send query to its neighbors (broadcast) the query is forwarded if TTL > 0 oB,C and E, respond with query_hit query_hit contains network info about where to download the file from B forwards query_hit msgs from E and C, to

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 9/26 Gnutella Protocol for P2P File Sharing(3) There is nothing that stops a servant flooding its network region with messages. Cost of maintaining Network Cost of searching file From A Quantitative Analysis of the Gnutella Network Traffic

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 10/26 Kazza and Morpheus Kazza, Morpheus ounstructured network opartially centralized systems which use the concept of SuperNodes oPeers are automatically elected to become SuperNodes if they have sufficient bandwidth and processing power oIn Morpheus, a central server provides new peers with a list of one or more SuperNodes with which they can connect. SuperNodes index the files shared by peers connected to them and proxy search requests on behalf of these peers. Queries are therefore sent to superNodes

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 11/26 CAN (Content Addressable Network) oa distributed, internet-scale hash table that maps file names to their location in the network Purely decentralized Scalable

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 12/26 Challenges Duplicated Messages oFrom loop and flooding Missing some contents oFrom loop and TTL Oriented to File Why? oUnstructured Network oToo Specific

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 13/26 Approach to Structured P2P Network Contribute to a way oto construct structured and general P2P network without loops and TTL oto know knowledge about constructed P2P network 2-D Space oMapping each nodes network identifier into 2-D space oZone Each node occupies allocated area Aggregate nodes with same network identifier into a zone Maintain a binary tree oCore Represent each zone Manage its zone Gateway between neighbor zones and its member oMember Belonged to a zone Each message should be sent to its zone and members in its zone

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 14/ Overview of Structured P2P Network zone Core node Member node Member Tree Tx within a zone Tx between zones

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 15/26 Elements of Structured P2P Network Core/Member Nodes oNeighboring zone information core info, zone info, direction oMember information member node information, routing table Strategies oRouting Messages oConstructing Structured P2P Network oManaging Zone oConstructing Member Tree oDiscovering Contents

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 16/26 Core/Member nodes 7 neighboring zone information oCore node (IP, Port#) oZone Range (x1,y1)~(x2,y2) Numbering zone o4 bits o00 : less than o01 : belong to o10 : greater than Member information oIP, Port# Member Tree oUplink node info (only 1) oDownlink node info (limited by 2)

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 17/26 Routing Messages Within a zone oDepends on the Member Tree (Binary Tree) Between zones oIf not a core, just send its core oThen core route this message along X coordinate until reaching destination x oAfter that, route the message along Y coordinate Every Message should have originators IP and Port

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 18/26 Constructing Structured P2P Network(JOIN) RP NodeCore Bootstrapping JOIN/(JOIN_FWD) Join As Core/Join As Member Inform Neighboring Zones Zone Management Routing Message Inform Neighboring Zones Inform Members

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 19/26 Managing Zone(1) same network identifier? Yes No Accept as a Member Split Zone & Rearrange Neighbors Msg AsMember Msg AsCore Reply Inform Neighbors Msg Type? AsMember AsCore Inform Members Set itself & Inform Neighbors Join Completed

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 20/26 Managing Zone(2) Splitting Zone oNetwork ID of New node is within its zone range, but Network ID is different Direction of Split oX or Y direction oDepends on Difference of X and Y between two network IDs Rearrange neighboring zones Two nodes inform neighbors of this change X Y

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 21/26 Constructing Member Tree Each node oMaintain information of all members oCreates a binary tree Using sorted IP address oRule one link between core and a member Uplink is only one Downlink is limited by Core

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 22/26 Discovering Content Content Discovery oSend the Msg to its Member and its core oCore On receiving it, Send it neighbor zones along X coordinate Also send it Neighboring Y zones with flooding DiscoveryHit X Y

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 23/26 Current Status Still Experimenting Environment oGT-ITM Creating Network Topology About 100,000 nodes Your advice Your advice oSimulator Myns oOS Linux oDev. Lang. Gcc/g++ version 2.96

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 24/26 Conclusion By introducing 2-D space oConstruct structured P2P network oReduce duplicated msgs (from zone and aggregation of same LAN nodes) oGuarantee visiting the whole node Future Work oimplementing simulator oAdd Recovery Mechanism oAdd native IP multicasting on Local Area Network oReflect real network topology on simulator

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 25/26 Thank You!

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 26/26 References K. Calvert, M. Doar, and E. Zegura. Modeling Internet Topology. IEEE Transactions on Communications, pages , December GT_ITM, Geogia Tech. myns Simulator, Univ. of Maryland, Suman Banerjeehttp:// S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, "A Scalable Content-Addressable Network", ACM Sigcomm 2001A Scalable Content-Addressable Network Peer-to-Peer Architecture Case Study: Gnutella. M. Ripeanu International Conference on Peer-to-Peer Computing (P2P2001), Linkoping, Sweeden, August 2001 Peer-to-Peer Architecture Case Study: Gnutella. Kazza, Morpheus,