UNIVERSITY OF JYVÄSKYLÄ Chedar: Peer-to-Peer Middleware Presentation for 8 th International Workshop on Java tm for Parallel and Distributed Computing.

Slides:



Advertisements
Similar presentations
Optimal Resource Discovery Paths of Gnutella2 The IEEE 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)
Advertisements

UNIVERSITY OF JYVÄSKYLÄ Mobile Search – Social Network Search Using Mobile Devices 1 st IEEE International Peer-to-Peer for Handheld Devices Workshop IEEE.
UNIVERSITY OF JYVÄSKYLÄ P2PRealm – Peer-to-Peer Simulator Presentation for 11 th International Workshop on Computer- Aided Modeling, Analysis and Design.
UNIVERSITY OF JYVÄSKYLÄ P2PStudio – Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research Presentation for PM 2 HW 2 N on 2.
UNIVERSITY OF JYVÄSKYLÄ Mobile Chedar – A Peer-to-Peer Middleware for Mobile Devices Presentation for International Workshop on Mobile Peer-to- Peer Computing.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
UNIVERSITY OF JYVÄSKYLÄ Mobile Encounter Networks and Their Applications 1 st IEEE International Peer-to-Peer for Handheld Devices Workshop IEEE CCNC,
UNIVERSITY OF JYVÄSKYLÄ P2PDisCo – Java Distributed Computing for Workstations Using Chedar Peer-to-Peer Middleware Presentation for 7 th International.
UNIVERSITY OF JYVÄSKYLÄ New Topology Management Algorithms for Unstructured P2P Networks Presentation for The Second International Workshop on P2P Systems.
Peer-to-peer and agent-based computing P2P Algorithms.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in A Social Network Presentation for P2P content and distribution seminar of ICTSHOK Future Internet
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.
UNIVERSITY OF JYVÄSKYLÄ InBCT 3.2 Peer-to-Peer communication/computation Cheese Factory -project Prof., D.Sc. (EE)
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
UNIVERSITY OF JYVÄSKYLÄ Distributed computing in peer-to-peer environment InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Algorithms and Prototypes in Jyväskylä Mikko Vapa, research student Department of Mathematical Information.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms in Chedar InBCT 3.2 Peer-to-Peer communication Cheese Factory -project
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Ad Hoc Wireless Routing COS 461: Computer Networks
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Searching In Peer-To-Peer Networks Chunlin Yang. What’s P2P - Unofficial Definition All of the computers in the network are equal Each computer functions.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Plug-in for Singleton Service in Clustered environment and improving failure detection methodology Advisor:By: Dr. Chung-E-WangSrinivasa c Kodali Department.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Peer to Peer Network Design Discovery and Routing algorithms
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
UNIVERSITY OF JYVÄSKYLÄ UBIWARE Nokia Research Center Case Meeting on Mikko Vapa, research student P2P Computing Group Department of Mathematical.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Project JXTA Kaarthik Sivashanmugam. JXTA..? JXTA is a set of open, generalized peer-to-peer (P2P) protocols that allow any connected device on the network.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman.
Data Management on Opportunistic Grids
3. Internetworking (part 2: switched LANs)
Chapter 10 IGMP Prof. Choong Seon HONG.
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
IP Multicast COSC /5/2019.
Presentation transcript:

UNIVERSITY OF JYVÄSKYLÄ Chedar: Peer-to-Peer Middleware Presentation for 8 th International Workshop on Java tm for Parallel and Distributed Computing (IWJPDC 2006) Annemari Auvinen, research student Department of Mathematical Information Technology University of Jyväskylä, Finland With co-authors Mikko Vapa, Niko Kotilainen, Matthieu Weber and Jarkko Vuori

UNIVERSITY OF JYVÄSKYLÄ Agenda Peer-to-Peer Networks Chedar Chedars Structure Messages Topology Management Algorithms

UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Networks Peer-to-Peer (P2P) networks allow sharing of resources (e.g., computing power, storage space) over the Internet Every node serves as a server and a client In contrast to clusters, in P2P networks all the tasks and responsibilities for managing the network are shared between peers

UNIVERSITY OF JYVÄSKYLÄ Related Work Gnutella –Pure P2P protocol –Search queries are broadcasted by using BFS with TTL –Pre-defined amount of neighbors Chedar differs: –Middleware –Topology management algorithms –4 search algorithms –Resource reply routing –XML-based structured resource description

UNIVERSITY OF JYVÄSKYLÄ Chedar Chedar is a totally decentralized P2P middleware implemented using Java Neighbors goodness is defined based on the resource replies the node has received from the neighbor Basis for P2P applications: distributed computing (P2PDisCo), data fusion, extension for mobile devices

UNIVERSITY OF JYVÄSKYLÄ Structure 1/3 ChedarClient –API for Chedar startConnecting() setMonitor(iMonitor) pingMessage() setResources(resource) createResourceQuery(query, algorithm, ttl) setTrafficLimit(limit) forceConnection(id) forceDisconnection(id) closeAllConnections –By implementing a monitoring interface iMonitor the application may get events about sent and discarded queries, forwarded messages, sent replies, received replies and connection requests

UNIVERSITY OF JYVÄSKYLÄ Structure 2/3 ConnectionManager –Manages active connections and history data –Keeps cache about the forwarded messages –Forwards received messages to the right component –Measures traffic: Traffic limit and meter -> Overload TopologyManager –Makes decisions which connections are dropped and where to establish a new connection –Handles topology management messages

UNIVERSITY OF JYVÄSKYLÄ Structure 3/3 PropagationEngine –Handles the resource queries and replies –4 resource discovery algorithms: BFS, Random Walk, Highest Degree Search and NeuroSearch Connections –Include local information about nodes neighbors –Used by topology management algorithms

UNIVERSITY OF JYVÄSKYLÄ Connections Chedar keeps information about active connections and history data about the earlier connections in XML trees Active connections and history data contains –IP address and TCP port –Resource types the node provides –Hit values –Request time Hit value is increased every time the node gets a resource reply from its neighbor Relayed hits include the neighbors neighbors and the amount of replies those have relayed to the node through the neighbor

UNIVERSITY OF JYVÄSKYLÄ Messages Topology management messages – Connection requests and replies for establishing connections – NeighborList requests and replies for quering neighbors neighbors – ServiceList requests and replies for quering the resource types neighbor provides Resource requests and replies

UNIVERSITY OF JYVÄSKYLÄ Resource reply routing Reply goes back to the iniator of the query same route as the query came if all nodes are still available If the node where the query came to the node is not available the reply is tried to sent to the second next node on the return path If the previous node is not available the reply is sent directly to the iniator of the query Peer 3Peer 2 Peer 1 Peer 4 query reply

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms 1/4 Node Selection 1. Tries to establish the connections which the peer had before leaving the network 2. History data 1. Connections with hit values and old request time 2. Connections with old request time or unrequested connections 3. Connections without hit values and request time 4. Connections with hit values

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms 2/4 Node Removal – Selects the worst connection – Worst connection is a connection which has the smallest goodness value – Goodness value: connections hits+its neighbors relayed hits

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms 3/4 Overload Estimation – Connections are established and dropped based on the amount of traffic going through the node – ConnectionManager measures the traffic in the given time sequence and if it is more than the given upper traffic limit one connection is dropped by using Node Removal – If the traffic meter is less than the lower traffic limit, algorithm tries to establish a new connection by using Node Selection

UNIVERSITY OF JYVÄSKYLÄ Topology Management Algorithms 4/4 Overtaking – Peer moves closer to the good peers by overtaking the current connection – If connection has neighbor which relayed hits proportion of all neighbors relayed hits and connections hits is more than the given overtaking percent a new connection to that neighbor is established and current connection is dropped –Peers which provide lots of resources are in the middle of the network Hits:2 Relayed hits:6 (60%) Relayed hits:2 (20%)

UNIVERSITY OF JYVÄSKYLÄ Future Further development of the topology management algorithms and NeuroSearch resource discovery algorithm Further development of applications using Chedar –P2PDisco which is used for speeding up the training of neural networks with evolutionary algorithm