Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur.

Slides:



Advertisements
Similar presentations
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in P2P Networks Using Evolutionary Neural Networks Presentation for International Conference on Advances in.
Advertisements

Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
School of Information University of Michigan Network resilience Lecture 20.
VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
1 Routing Techniques in Wireless Sensor networks: A Survey.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
Niloy Ganguly Complex Networks Research Group Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Collaborators.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
Small-world Overlay P2P Network
Increasing Application Performance In Virtual Environments Through Run-time Inference and Adaptation Ananth I. Sundararaj Ashish Gupta Peter A. Dinda Prescience.
Design Patterns from Biology for Distributed Computing Andres J. Ramirez.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
Characterizing the Two-Tier Gnutella Topology  Gnutella, FastTrack, and eDonkey use two-tier overlay topologies.  Our initial study focuses on Gnutella.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Searching in Unstructured Networks Joining Theory with P-P2P.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
Two Dimensions and Beyond From: “ A New Kind of Science” by Stephen Wolfram Presented By: Hridesh Rajan.
1 Reasons for parallelization Can we make GA faster? One of the most promising choices is to use parallel implementations. The reasons for parallelization.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
1 Autonomic Computing An Introduction Guenter Kickinger.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
` Research 2: Information Diversity through Information Flow Subgoal: Systematically and precisely measure program diversity by measuring the information.
File Processing - Database Overview MVNC1 DATABASE SYSTEMS Overview.
Zentrum für Hochleistungsrechnen (ZHR) – A Bios Group Presentation Niloy Ganguly Immune System and Search Technology Designing a Fast Search Algorithm.
Study on Genetic Network Programming (GNP) with Learning and Evolution Hirasawa laboratory, Artificial Intelligence section Information architecture field.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith CohenScott Shenker Some slides are taken from the authors’ original presentation.
Implicit group messaging in peer-to-peer networks Daniel Cutting, 28th April 2006 Advanced Networks Research Group.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Externally growing self-organizing maps and its application to database visualization and exploration.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Complex Network Theory – An Introduction Niloy Ganguly.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Design of a Robust Search Algorithm for P2P Networks
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Daniele Miorandi &
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Niloy Ganguly, Andreas Deutsch Center for High Performance Computing
Research Scopes in Complex Network
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Deterministic and Semantically Organized Network Topology
Presentation transcript:

Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur

Talk Overview Peer to peer networks and autonomic computing Search in peer to peer networks Algorithms proposed –Regulated message Passing –Evolving semi-structured networks Conclusion

Autonomic Computing Autonomic Computing - analogy to the human autonomic nervous system. Nature-inspired Computing Initiative started by IBM in Aim is to create self-managing systems to overcome their rapidly growing complexity and to enable their further growth.

Functional Areas Role of human operator not to control the system directly instead define general policies and rules that serve as an input for the self-management process.

Functional Areas Self-configuring –adaptation to IT system changes, such as new nodes becoming available or going offline Self-optimising –tuning resources and load balancing Self-protecting –guard against damage from attacks or failures Self-healing –recovery from, or work around, failed components

Peer To Peer Network Most Direct Method of Connecting Computers –Simple –Inexpensive –No Boss –No Regulation

PCs at the edge of the network are called “Peers” Peers can retrieve objects directly from each other Advantages of a P2P Network A large collection of peers may be available for content distribution-- sometimes millions! User takes advantage of the network’s currently available resources. Peer To Peer Network

Peer-to-Peer Systems

Unstructured P2P and Autonomic Computing Unstructured P2P – No rule exists for data placement and overlay topology is arbitrary. Ex : Gnutella Self-organizing Self-configuring adaptation to IT system changes, such as new nodes becoming available or going offline Self-optimising tuning resources and load balancing (connectivity according to the type of connection used) Self-protecting guard against damage from attacks or failures Self-healing recovery from, or work around, failed components (performance degradation due to failure quickly recovered)

Search in Unstructured P2P Random walk Non-deterministic Algorithms - Random walk, Flooding a c b f g d e ? 6!!!

Search in Unstructured P2P Problems in basic search schemes – Flooding is fast. – Random walk is efficient. Objective –Design a search scheme which is Fast i.e. reduces query response time. Efficient i.e uses minimum query packets. Strategy –Regulated message Passing –Evolving semi-structured networks

Immune Inspired Message Forwarding Algorithms Proliferation/Mutation Algorithms Simple Proliferation Algorithm (P) Restricted Proliferation Algorithm (RP) Random Walk Algorithms Simple Random Walk Algorithm (RW) Restricted Random Walk Algorithm (RRW)

Proliferation/Mutation Algorithms Simple Proliferation/Mutation Algorithm (PM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighbouring nodes a c b f g d e N = 3 Mutated

Proliferation/Mutation Algorithms Restricted Proliferation/Mutation Algorithm (RPM) Produce N messages from the single message. (Mutate one bit with prob. β) Spread them to the neighbouring nodes if free a c b f g d e N = 3

Proliferation Controlling Strategy Proliferate more when content and query packets are similar Affinity-driven proliferation

P2p Network Query Message Searched Item Similarity (message, searched item) Affinity-governed proliferation based search algorithm Immunity Inspired Search Human Body Antibody Antigen Interaction between message and searched item Message proliferation

Evaluation Metrics 1.Network coverage efficiency No of time steps required to cover the entire network 2.Average Cost No of message packets (average over each time step) needed to cover a network Follow Fairness criteria - All processes work with same average number of packets.

Experiment Experiment Coverage – Calculate time taken to cover the entire network after initiation of a search from a randomly selected initial node. Repeated for 500 such searches.

Performance of Different Schemes Percentage of Network Covered Time P RP RRW RW

Search Efficiency and Cost Regulation 1 Generation = 100 search attempts

Result Summary Proliferation is better than random walk Proliferation is performing at par with restricted proliferation except producing large number of packets If the item is present in more number then more packets are produced.

Random Walk = Diffusion From Nature to Nature - Analytical Insights

Proliferation = Reaction-Diffusion System (Diffusion + Addition of New Materials) Analytical Insights

Calculating Speed of Diffusion Calculate Speed of a finite density  Diffusion Equation pdf of a concentration u Speed (c) of a concentration 

Calculating Speed of Reaction-Diffusion Proliferation – Each time  fraction of concentration is added to the system Reaction- Diffusion Equation:

Result Summary and realizations Proliferation is better than random walk Proliferation is performing at par with restricted proliferation except producing large number of packets

Fast coverage of nodes. Minimum usage of message packets. Can we quantify Fast and Minimum (what exactly does it mean?) or At least can we express it qualitatively in terms of message movement Result Summary and realizations

Self Regulating Proliferation Have proliferation in such a way, so that each individual packets have just enough place to explore without overlapping with others Minimum – Use as few packets as possible so that each packet has individual area to explore without colliding with other packets. Fast -Fastest possible under the above restriction of minimum.

Distinct Regimes in Random Walk Spread Regime1 : At the start, when all the N walkers are close to each other, they demonstrate a flooding behavior. Regime 2 : (Intermediate state) There is still considerable collision, however each packet has some place to explore. Regime 3 : All the random walkers are far away from each other and the system behave as if comprising of N independent random walkers

Optimum Point and our aim Time No of nodes covered ---- Period Period 3 N = 10 Optimum Point Collision Unexplored area Can we regulate proliferation scheme so that system always remains at the optimum point

Optimum proliferation rate  Time Value of  Optimum value of  such that the system always stays at the conjuction between Period 2 and Period 3 Period 2= t d/2 Period 3 =  (  +1) t. N proli.t t 3/2 =  t. N proli.t  = (t/ N proli 2 ) (1/2t)  tends to 1, exponential growth of packet is restricted.

Results (No Proliferation) Time R distvist_walker R distvist_walker – Number of distinct visits per walker Regime 1 Regime 2 Regime 3

Results (Regulated Proliferation) Regulated proliferation with optimal  Time R distvist_walker

Evolving semi-structured networks Community Formation Profile based community is formed by rearranging the Topology Aim - Cluster Similar Nodes (Similar in Information and Search Profile) Algorithm - Move nodes similar to user node closer to the user by rewiring links.

Topology Evolution Snapshots

Transient Condition Search Efficiency -- Without replacemnt % replacement -- 5% replacement % replacement -- Proliferation 1

Conclusion Different ongoing activity on optimizing peer to peer networks –Search –Topology Management –Growth

References Design Of An Efficient Search Algorithm For P2P Networks Using Concepts From Natural Immune Systems. In PPSN VIII: The 8th International Conference on Parallel Problem Solving from Nature, Birmingham, UK, September Design and analysis of a bio-inspired search algorithm for peer to peer networks. In post proceedings of the workshop SELF-STAR: Self-* Properties in Complex Information Systems, 2005.Design and analysis of a bio-inspired search algorithm for peer to peer networks..Design Patterns from Biology for Distributed Computing ACM Transaction of Autonomous and Adaptive Systems Vol 1 Issue 1 (September 2006).Design Patterns from Biology for Distributed Computing