Presentation is loading. Please wait.

Presentation is loading. Please wait.

Peer-to-Peer Services Lintao Liu 5/26/03. Papers YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search.

Similar presentations


Presentation on theme: "Peer-to-Peer Services Lintao Liu 5/26/03. Papers YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search."— Presentation transcript:

1 Peer-to-Peer Services Lintao Liu 5/26/03

2 Papers YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search in Peer-to-Peer Network: Harnessing Latent Semantics AT&T Research Lab & Tel Aviv Univ. Cooperative Peer Groups in NICE Univ. of Maryland

3 YAPPERS: A P2P Lookup Service over Arbitrary Topology Motivation: Gnutella-style Systems work on arbitrary topology, flood for query Robust but inefficient Support for partial query, good for popular resources DHT-based Systems Efficient lookup but expensive maintenance By nature, no support for partial query Solution: Hybrid System Operate on arbitrary topology Provide DHT-like search efficiency

4 Design Goals Impose no constraints on topology No underlying structure for the overlay network Optimize for partial lookups for popular keys Observation: Many users are satisfied with partial lookup Contact only nodes that can contribute to the search results no blind flooding Minimize the effect of topology changes Maintenance overhead is independent of system size

5 Query Model: pair TotalLookup(N, k): Return all values associated with k Query initiates from Node N PartialLookup(N, k, n): Return n values associated with k If total available < n, return all available

6 Basic Idea: Keyspace is partitioned into a small number of buckets. Each bucket corresponds to a color. Each node is assigned a color. # of buckets = # of colors Each node sends the pairs to the node with the same color as the key within its Immediate Neighborhood. IN(N): All nodes within h hops from Node N.

7 One simple example: 2 colors

8 Immediate Neighborhood Different node has different IN set. Two problems: Consistency: same node should get the same color in different IN set. Stability: same node is always assigned with the same color even it leaves/joins. Solution: Hashing the IP address => color

9 More … When node X is inserting Multiple nodes in IN(X) have the same color? No node in IN(X) has the same color as key k? Solution: P1: randomly select one P2: Backup scheme: Node with next color Primary color (unique) & Secondary color (zero or more) Problems coming with this solution: No longer consistent and stable The effect is isolated within the Immediate neighborhood

10 Extended Neighborhood IN(A): Immediate Neighborhood F(A): Frontier of Node A All nodes that are directly connected to IN(A), but not in IN(A) EN(A): Extended Neighborhood The union of IN(v) where v is in F(A) Actually EN(A) includes all nodes within 2h + 1 hops Each node needs to maintain these three set of nodes for query.

11 The network state information for node A (h = 2)

12 Searching with Extended Neighborhood Node A wants to look up a key k of color C(k), it picks a node B with C(k) in IN(A) If multiple nodes, randomly pick one If none, pick the backup node B, using its EN(B), sends the request to all nodes which are in color C(k). The other nodes do the same thing as B. Duplicate Message problem: Each node caches the unique query identifier.

13 More on Extended Neighborhood All pairs are stored among IN(X). (h hops from node X) Why each node needs to keep an EN(X)? Advantage: The forwarding node is chosen based on local knowledge Completeness: a query (C(k)) message can reach all nodes in C(k) without touching any nodes in other colors (Not including backup node)

14 Maintaining Topology Edge Deletion: X-Y Deletion message needs to be propagated to all nodes that have X and Y in their EN set Necessary Adjustment: Change IN, F, EN sets Move pairs if X/Y is in IN(A) Edge Insertion: Insertion message needs to include the neighbor info So other nodes can update their IN and EN sets

15 Maintaining Topology Node Departure: a node X with w edges is leaving Just like w edge deletion Neighbors of X initiates the propagation Node Arrival: X joins the network Ask its new neighbors for their current topology view Build its own extended neighborhood Insert w edges.

16 Problems with basic design Fringe node: Those low connectivity node allocates a large number of secondary colors to its high- connectivity neighbors. Large fan-out: The forwarding fan-out degree at A is proportional to the size of F(A) This is desirable for partial lookup, but not good for full lookup

17 A is overloaded by secondary colors from B, C, D, E

18 Solutions: Prune Fringe Nodes: If the degree of a node is too small, find a proxy node. Biased Backup Node Assignment: X assigns a secondary color to y only when a * |IN(x)| > |IN(y)| Reducing Forward Fan-out: Basic idea: try backup node, try common nodes

19 Experiment: H = 2 (1 too small, >2 EN too large) Topology: Gnutella snapshot Exp1: Search Efficiency

20 Distribution of colors per node

21 Fan-out:

22 Num of colors: effect on Search

23 Num of colors: effect on Fan-out

24 Conclusion and discussion Each search only disturbs a small fraction of the nodes in the overlay. No restructure the overlay Each node has only local knowledge scalable Discussion: Hybrid (unstructured and local DHT) system …

25 Associative Search in P2P networks: Harnessing Latent Semantics Motivation: Similar with the previous paper Avoid a blind search on unstructured P2P Not sensitive to node join/failure Proposed system: Associative Overlays Based on unstructured architecture Improve the efficiency of locating rare items by “orders of magnitude”.

26 Basic Idea: Exploit association inherent in human selections Steer the search process to peers that are more likely to answer a query Guide Rule: A set of peers that satisfy some predicate A search message is only flooding inside one specific Guile Rule.

27 Guide Rule

28 More on Guile Rule: Peers in one Guile Rule Contain data items that are semantically similar. E.g. Contain documents on philosophy, songs… Choose a Guile Rule for query message: “Networking” aspect (connectivity properties…) “data mining” aspects: Tules distill common interests Maintenance: Maintain a small list of other peers Possession Rules Automatically extracted guide rules from the shared items

29 Algorithms RAPIER Algorithm: Random Possession Rule If a node is interested in A, B, C, etc, just randomly choose one and perform a blind search amongst that rule More efficient than blink search GAS Algorithm: Greedy Guide Rule Deciding the order to try different rules Each node invokes a query in rules that have been more effective on its past queries.

30 Conclusion and Discussion It offers orders of magnitude improvement in the scalability of locating infrequent items Discussion: the advantage is generated by classifying unstructured peers into some loose so-called “Guile Rules”. Didn’t understand how they clearly defined these Rules and maintain it. A lot of mathematics and data mining stuff

31 Cooperative Peer Groups in NICE Trust management in P2P environment Design: Reputation information is stored in a completely decentralized manner. Efficient identify non-cooperative nodes Basic operation: After a transaction between A and B A will sign a cookie and send it to B, B does the same thing Cookies can be dropped as A/B likes.

32 Trust Graph Vertex: Nodes If A has a cookie issued by B, we draw an edge from B to A. The weight of the edge is the value given by B in the cookie (1/0 in this paper) A can calculate how much A should believe B Two different ways proposed

33 Distributed Trust Reference: A wants to do a transaction with B: A needs to present some cookies to B that A is “good” If A has a cookie assigned by B, A just sends it to B. If A doesn’t have a cookie from B, so A should collect some related cookies to make B believes that it is “good”.

34 Distributed Trust Inference: Detailed Procedures: A initiates a search for B’s cookies Recursively search its neighbors This will generate a trust graph starting from B and ending at A. A presents all the cookies to B B will decide whether A is “good” or not It is A who collects the cookies to Avoid DoS attack.

35 Refinements Efficient searching Each node caches the cookies of its neighbors When A searches for B’s cookies, A checks whether its neighbors have. If no, randomly choose neighbors to forward This is like flooding: if a neighbor fails, try next This random walk is limited to predefined steps.

36 Refinement: Negative Cookies: If A has present B enough cookies to make sure A is a “good” peer, B can search for “Negative cookies” of A to make sure. Search follows the high trust edges out of B Preference Lists: Nodes that are highly probably to be “good” A will try to do transaction with those nodes.

37 Conclusion and discussion: Scalable Resistant to some attack. But many aspects still don’t look very nice yet. Discussion??


Download ppt "Peer-to-Peer Services Lintao Liu 5/26/03. Papers YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search."

Similar presentations


Ads by Google