School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.

Slides:



Advertisements
Similar presentations
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Intel Research Seattle Sylvia Ratnasamy, Lee Breslau, Scott Shenker, and Nick Lanham.
Advertisements

VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
Efficient Search - Overview Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Efficient Search in Peer to Peer Networks By: Beverly Yang Hector Garcia-Molina Presented By: Anshumaan Rajshiva Date: May 20,2002.
Searching in Unstructured Networks Joining Theory with P-P2P.
Department of Computer Engineering Koc University, Istanbul, Turkey
1 An Incentive Mechanism for Message Relaying in Peer-to- Peer Discovery Cuihong Li (TSoB), Bin Yu (RI) and Katia Sycara (RI) Carnegie Mellon Unversity.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
P2P Architecture Case Study: Gnutella Network
IR Techniques For P2P Networks1 Information Retrieval Techniques For Peer-To-Peer Networks Demetrios Zeinalipour-Yazti, Vana Kalogeraki and Dimitrios Gunopulos.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau (Several slides have been taken.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau Parts of it has been adopted from.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
By Jonathan Drake.  The Gnutella protocol is simply not scalable  This is due to the flooding approach it currently utilizes  As the nodes increase.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Peer to Peer Network Design Discovery and Routing algorithms
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
SmartGossip: A Reliable Broadcast Service for Wireless Sensor Networks
Peer-to-Peer Data Management
GIA: Making Gnutella-like P2P Systems Scalable
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Presentation transcript:

School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna Seneviratne

School of Electrical Engineering &Telecommunications UNSW Peer to Peer Systems Two types –Structured Guarantee location of content (if exists) Access within bounded number of hops  Control of data placements and topology –Unstructured Decentalized Looser guarantees  Placement of data and topology is ad-hoc

School of Electrical Engineering &Telecommunications UNSW Wireless Environments Characterized by –Highly transient node populations –Wide range of users form non cooperating organizations –Searches on partial information –Not typically looking for “rare” information – replicated at a number of places Not a good match for structured systems –Back to unstructured systems

School of Electrical Engineering &Telecommunications UNSW Unstructured Systems Most widely used application of p2p systems is file sharing –As the placement of data is ad-hoc Only random searchers are possible Hard to find desired files without wide distribution of queries Unscalable unless can improve the efficiency of searches

School of Electrical Engineering &Telecommunications UNSW Example - Gnutella Gnutella can be considered as “pure” peer- to-peer system –Fully decentralized and distributed searching Operation of Gnutella –Two types of services Searching for files Peer discovery –Implemented with application level broadcasts –Broadcast is implemented with TTL flooding

School of Electrical Engineering &Telecommunications UNSW File Location A query message is forwarded to all its neighbors, except for the one, where it was received from Each message has a Time To Live (TTL) –Decremented by one at each visited node –Message is dropped when TTL=0 Each message has an unique ID Node keeps a record of IDs of messages that it has seen in the recent past –Message with the same ID and type as ones that that have been received are dropped

School of Electrical Engineering &Telecommunications UNSW Cost Metric 1 Define a cost metric for comparison of methods –number of messages that are generated and forwarded – based solely on the network size and the average node degree, Estimate the average bandwidth consumption per node

School of Electrical Engineering &Telecommunications UNSW Cost Metric 2

School of Electrical Engineering &Telecommunications UNSW Flooding - Unscalable Resource consumption per node of flooding based broadcast can be prohibitively high, even for networks of moderate size

School of Electrical Engineering &Telecommunications UNSW Rumor Mongering or Gossip Protocols A class of probabilistic protocols for message routing Messages are spread in a network much like a disease in a susceptible population. (epidemiological protocol) The neighbors to which messages are forwarded to by each node are chosen randomly. Trades off reliability and speed for a reduction in cost

School of Electrical Engineering &Telecommunications UNSW Blind Counter Rumor Mongering A node n initiates a broadcast –Send the message m to B neighbors, chosen at random –When a node (p) receives a message m from anther node (q) If (p has received m no more than F times) p sends m to B uniformly randomly chosen neighbors that p knows have not yet seen m –p knows if its neighbor q has already seen the message m only if p has sent it to q previously, or if p received the message from q

School of Electrical Engineering &Telecommunications UNSW Cost of BCRM Difficult to obtain analytical expressions to describe the behavior of a Gossip protocol, even for relatively simple topologies Can give an upper limit – bounded by BF- an upper limit for the cost c

School of Electrical Engineering &Telecommunications UNSW Simulation Results Barabási Topology: –Model for generating topology is based on how typical p2p networks evolve –Power-law characteristics 1000 nodes with an average node degree of 6 –F and B for the BCRM was set to be 2

School of Electrical Engineering &Telecommunications UNSW Some More Results Trade-off of cost, reliability and time by choosing F and B appropriately Level of cost reduction depends on the average node degree –The higher the node degree is, the bigger the potential for cost reduction

School of Electrical Engineering &Telecommunications UNSW P2P Network Topologies Typical characteristic of peer-to-peer networks is a power-law distribution of the node degrees – most nodes have few links while a small number of nodes have a large number of links From Matei Ripeanu & Ian Foster

School of Electrical Engineering &Telecommunications UNSW Deterministic Rumor Mongering Make intelligent decisions as to which of its neighbors to forward messages to Based it on the node degree of the corresponding nodes –The nodes with the lowest degree are chosen first

School of Electrical Engineering &Telecommunications UNSW Deterministic Rumor Mongering cont. When a node p receives a message m from node q –If (p has received m no more than F times) 1)send m to all of its neighbors of degree one, and 2)B of the rest of its neighbors with the lowest node degree, that p knows have not yet seen m

School of Electrical Engineering &Telecommunications UNSW Rationale for (1) Pendant neighbors, have no other chance to receive the message These pendant neighbors cannot contribute to the further propagation of the message – not considered for the limit of B messages to be forwarded

School of Electrical Engineering &Telecommunications UNSW Rationale for (2) Nodes of high degree receive a large number of copies of the same message –This overhead grows approximately linearly with the node degree –Also with higher parameters B and F.

School of Electrical Engineering &Telecommunications UNSW Viability The only requirement is that each node knows the node degree of its immediate neighbors Not in conflict with the decentralized nature of the networks –Can easily be integrated –Gnutella a one byte field in the Gnutella message header Increasing the minimal message size by less than 5%.

School of Electrical Engineering &Telecommunications UNSW Some Results Performance of Deterministic Rumor Mongering compared to Blind Counter Rumor Mongering For a given B and F, DRM achieves a significant higher reach than the BCRM, within a shorter time For a given reach, DRM has a significantly lower cost

School of Electrical Engineering &Telecommunications UNSW Some More Results  BCRM  DRM (B,F)

School of Electrical Engineering &Telecommunications UNSW Conclusions Unstructured peer-to-peer systems are more suitable for wireless environments For unstructured systems to be viable, scalable methods of searching need to developed The obvious way of is to look at alternatives to broadcast One such scheme that have been used in the past in other application is Rumor Mongering (Gossiping) We show that, Rumor Mongering, can be used as a basis for providing an alternative flooding for distributing queries in unstructured peer to peer systems

School of Electrical Engineering &Telecommunications UNSW More Information Available form mobqos.ee.unsw.edu.au M. Portmann, Pipat Sookavatna, Sebstien Ardon and Aruna Seneviratne,”The Cost of Peer Discovery and Searching in the Gnutella Peer-to-peer File Sharing Protocol”, IEEE ICON 2001, Bangkok, September 2001 M. Portmann, and Aruna Seneviratne, “The Cost of Application-level Broadcast in a fully Decentralized Peer-to-peer Networks”, ISCC, Italy, July 2002 M. Portmann, and Aruna Seneviratne, “Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks”, accepted for publication, Computer Communication, Special Issue on Ubiquitous Computing Also related work Qin Lv, Sylvia Ratnasamy and Scott Shenker,”Can Heterogeneity Make Gnutella Scalable?”, 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002 Berverly Yang, and Hector Garcia-Molina,”Efficient Search in Peer-to-Peer Networks”, 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002

School of Electrical Engineering &Telecommunications UNSW Possibly some ….. ?