Indexing Through Querying in Unstructured Peer-to-Peer Overlay Networks

Size: px
Start display at page:

Download "Indexing Through Querying in Unstructured Peer-to-Peer Overlay Networks"

Transcription

1 Indexing Through Querying in Unstructured Peer-to-Peer Overlay Networks K Haribabu 1, Chittaranjan Hota 2, and Antti Ylä-Jääski 3 1 Computer Sc. & Information Systems Group, Birla Institute of Technology and Science Pilani, ajasthan, INDIA 2 Computer Sc. & Information Syst. Group, Birla Institute of Technology and Science, Pilani Hyderabad Campus, Hyderabad, Andhra Pradesh, INDIA 3 Data Communications Software Laboratory, Deptartment of Computer Sc. & Engineering Helsinki University of Technology, Espoo, FINLAND khari@bits-pilani.ac.in, hota@bits-hyderabad.ac.in, antii.yla-jaaski@hut.fi Abstract. The efficiency of a Peer-to-Peer file sharing overlay is measured in terms of the scalability and versatility of its object lookup strategy. In these networks peers carry out distributed query relaying to discover the service providers. Existing lookup mechanisms like flooding and random walks in unstructured P2P overlays create huge communication overhead and increased response time. In this work we propose efficient lookup in unstructured peer-topeer overlay networks using indexing through querying, distributing indices through queries. Our simulation studies show that by our approach more than 97% of the queries are answered in one hop and the rest in few hops thus reducing the network load. Our approach is efficient in worst case scenarios where contents are distributed over thousands of peers and the overlay network condition is highly dynamic. Keywords: Peer-to-Peer, Overlay Networks, Indexing, Lookup, Bloom Filters 1 Introduction The emergence of Peer-to-Peer (P2P) overlay file sharing networks has increased the interest amongst the Internet users to use the Internet beyond web browsing and exchanging s. These networks have recently gained a lot of attention in academic and industrial circles. The P2P traffic occupies major chunk of the Internet traffic [1]. The kind of impact they generate on the whole Internet motivates the researchers to study and improve the scalability and performance of these networks. P2P overlay networks are application-level logical networks built on top of the physical networks as shown in Fig 1. These networks maintain separate addressing and routing mechanisms to enable efficient search and data exchange between peers. They don t require any special administrative or financial arrangement. They are selforganizing and adaptive, distributed and decentralized. There are two kinds of requests that are sent over the overlay edges, i.e. content requests to find an object and

2 keep-alive requests to stay connected in the overlay. P2P overlay networks are categorized as unstructured and structured. An unstructured P2P system is composed of peers joining the network with some loose rules, without any prior knowledge of the topology. Gnutella [2], and KaZaA [3] are examples of unstructured P2P overlay networks. In structured P2P overlay networks, network topology is tightly controlled and content is placed not at random peers but at specified locations that will make subsequent queries more efficient. Most of the structured P2P overlays are Distributed Hash Table (DHT) based. Content Addressable Network (CAN) [4], Chord [5], and Pastry [6] are some examples of structured P2P overlay networks. In unstructured P2P networks, the lookup for an object involves forwarding the queries to all P2P neighbors [7]. This generates huge message traffic in the network. As the queries are forwarded, the traffic exponentially multiplies at each hop. This degrades the network performance thus limits the scalability in terms of number of queries. As the number of queries increase in the network, the whole network bandwidth is consumed by these query messages, thus burdening the peers with unnecessary duplicate messages, message processing and giving very huge response times to the querying peers. core Fig. 1. An example Overlay Network This has prompted us to think of ways to utilize the huge traffic generated and reduce further the query explosion. In this paper we present a query-based index propagation approach for disseminating the content indices through the query traffic. Each index record is the collection of bits generated by Bloom Filter [8]. Every query carries a summarized index of contents of the peers that are on its way. At every node, the indices are copied to local cache and the local indices are updated in the query message. The nodes can lookup the local index cache and directly contact the node for the object. If the index record is not found, it uses the usual lookup algorithm. Through the traffic the indexes are disseminated. As the time passes, the query traffic reduces and reaches a steady state. The approach takes advantage of huge traffic for a good purpose. It offers many advantages. First it reduces the aggregate bandwidth consumption in the network. This improves the scalability. Second, it reduces the search latency by maintaining an index of the objects in the neighborhood. This improves the quality of the search giving satisfaction to the user. Third, the nodes which participate in processing the maximum traffic get the maximum benefit. Such nodes get one-hop access to the most of objects in the network. Fourth, the index is disseminated equally for both popular as well as unpopular objects. One of the demerits of unstructured networks is that it doesn t guarantee retrieval of an object although it is present in the network. This is due to few replicas of unpopular objects in the network. Due to this index distribution, many pointers to such objects are distributed thus reducing the risk of not finding objects. However, we do not address the free riding problem in P2P overlays in this work. IP

3 The simulation results show that Indexing Through Querying (ITQ) approach compared with Flooding and k-random walk techniques reduce the average bandwidth consumption and search latency by more than 95%. However, the ITQ approach is less efficient when there is very less query traffic in the system and there are very few replicas of the objects, which is of course an unlike scenario in today s peer-to-peer file sharing systems. 2 elated Work Gnutella [2] used query flooding for locating the objects which obstructs the scalability of any network. In local indices technique [9], each node maintains an index of data of all nodes within r hops of itself. When a node receives the query, it processes it on behalf of all the nodes within r hops of radius. Creating and maintaining such index involves extra overhead on the system. In routing indices technique [1], index is created for different topics in different routes. The index is used for choosing a neighbor to forward the query. In this technique, the aggregate updates are exchanged among the nodes to keep the index up to date. By sending only the aggregated vectors, the overhead is reduced. In attenuated bloom filter technique [11], an index for every neighbor and up to d number of hops is maintained. Index for neighbor n, stores the bits of objects generated by Bloom Filter [8] available at hop d through neighbor n. The index is maintained by exchanging the changed bits. In [12], a global but partial index is built using a Distributed Hash Tables (DHT) built on top of the unstructured overlay. The index consists of peer s top interests which is reflected by the nature of queries and objects peer has. Changes in the interests of peers involve changing the neighbors. In [13], super peers develop multi-attribute based content index by observing the QueryHit messages that pass through it. They use this index to efficiently forward the queries to selected neighboring super peers. There is separate index table for every attribute. The entries are deleted based on age factor. In advertisement based technique [14], a local index is built by requesting neighbors up to certain hop level to send their ads or indexes. In esearch [15], index for every term is created. One node is responsible for maintaining an index of one term. Nodes analyze their documents and find top terms and publish them to the respective nodes responsible for those terms. Our approach differs from above that the index is propagated by the queries. Nodes have passive involvement of loading the indices to and from queries. So the index distribution is fully dependent on query distribution. 3 Indexing Through Querying In this section we discuss design of our approach.

4 3.1 Scope In this paper we focus on unstructured peer-to-peer networks. The approach encourages the idea that instead of creating and maintaining indexes by individual nodes, index information is disseminated by the query traffic. Each node observes the query traffic that passes through it and updates its local index cache. There is always a trade-off between the scope of the index and maintenance cost. In one extreme every node can keep index of all the objects available in the network. That will surely make all the queries one-hop (zero hops for lookup and one hop for getting the object). But the cost associated with maintaining such an index prohibits such an approach. On the other extreme searching loses its grace without indexing. Indexing is the most important tool for searching [16]. Our approach is based on day-to-day observation that information about festivals, events and government policies are propagated by sticking the posters on the public transportation buses, trains etc. The vehicles wherever they go, by their presence they communicate the information to the people. This doesn t cost extra. We augment that idea to suit the peer-to-peer networks. Each query can be seen as vehicle carrying the index information of all the nodes it has passed through. The nodes receiving the query copy all the index information and add their indices to the query. This way whoever the query reaches gets benefited. When the node needs to find the object, it looks up its index cache and if there is match it will immediately contact the peer having that object. Our approach is fundamentally based on the observation that query traffic of public file sharing p2p networks occupies most of the internet traffic. In [1], it is observed that p2p network traffic occupies the 4% of total internet traffic. In [17], it is reported that there are 562 transactions per second happening in Kazaa [3] network. This clearly gives the extent of queries in p2p systems. Not only the successful queries but even the unsuccessful queries can be used as vehicles for carrying the index information. Not only the queries but even the query replies and download requests can be used for this purpose. That way we have huge percentage of traffic at our disposal for conveying. But in this paper we focus on query messages. 3.2 Data Structure The query passes through many nodes and if every node keeps its index in the query, query will become bulky and will consume huge bandwidth. To address this issue we use Bloom Filers to only store the summarized index for specified number of files in one node. Bloom Filters [14] are widely used to represent elements of a set using a bit set hashed through a set of hash functions. The filter may report an element is present even though it is not present in the set. This is known as false positive. But the filter never reports absence of an element when it is present in the set. The false positive probability (fpp) of representing set of elements of size n depends on size m of Bloom Filter and size k of set of hash functions. From (2), it can be noted that fpp reduces exponentially as n is reduced, and k and m are increased. The m and fpp are computed as follows [26]. m =(k * n)/ln2 (1)

5 fpp=(.6185) m/n (2) We have set of constraints when we apply Bloom Filters to our approach. First, query message size is limited. Maximum query size as per Gnutella protocol.6 [2], is 4 KB. The number of files shared by users varies from zero to thousands. So to have one bloom filter for all files in a node is not feasible. Second, Bloom Filters don t have an option of deleting elements. It can only add new elements into the filter. So nodes exchange indices in units of Bloom Filter not a part of it. It requires identifying each Bloom Filter uniquely across the network so that it is possible to replace old Bloom Filter with new one. As observed in [18], in a p2p file sharing network, 75% of nodes share 1 or less number of files. So it will be appropriate to group 1 files of a node and represent their file names in one Bloom Filter. Nodes having more than 1 files will have more than one Bloom Filter to convey their indices. By fixing size of n at 1, we have various alternatives in choosing size of m and k as listed in Table 1. As k increases fpp falls exponentially. The choice of k effects the bandwidth consumption, and the time required to disseminate the indices. For supporting efficient dissemination and Table 1. k and m and fpp m k fpp (bytes) updating of indices across the network without extra cost we propose the following structure called Query Index ecord (QI). QI record is denoted as (N, B, {, S, D c }). N refers to the node identity such as IP address and B refers to the bandwidth (mbps) of the connection available at node N, and rest is the set of Bloom Filter records (BF) of N. Each BF has, the record number unique for N, S refers to m bit array, and D c refers to the date on which this bloom filter is created by N. It is measured as seconds that have elapsed since the starting of the network. This date is used to compare the freshness of the BF. A BF is uniquely identified by the combination of N and. A query carries several QI records as many as it can fit in maximum message size. As observed in [18], a node is sharing maximum of 8 files. Each BF can store summary of 1 files as discussed above. The value of doesn t exceed 1 in worst case thus takes 1 byte space. For k=6, the size of BF record in bytes is (1, 19, 4) = 114 bytes. The size of QI record in bytes is (4, 1, size of set of BF). Also each node has a local cache of Node index records (NI). The structure of NI is (N, B, {, S, D c, D lu, D ll }). For each BF, node stores additional information like the date on which it was last successfully used (D lu ), and the date on which it was loaded on to a query (D ll ). D lu is used for removing the NI after certain time and D ll is used in deciding which indices to be loaded onto the query. Let us apply the above structure to Gnutella.6 [2] with k=6. A Gnutella Query message takes maximum of 54 bytes assuming that keywords usually take less than 3 characters thus maximum of 3 bytes. Maximum message size is 4 KB. Then it is possible to fit in (496 54) / 119 = 35 index records in each Query message. The 35 index records convey the locations of 35 objects in the network. What should be

6 done when there are more than 35 index records to load on to a query is discussed in next section. 3.3 Algorithm Overview When a node joins the network, during the initial handshake with neighbors, it collects the set of NI from each neighbor and updates its local index cache. When a node wants to lookup for set of keywords W, it first looks up its own files and index as shown in the search algorithm in Fig 2. Out of set of hosts H, chosehostwithmaxbw procedure chooses the host h with maximum bandwidth. If there are no matches, it will resort to usual lookup method i.e, flooding or random walk. The query Q is populated with the cached indices. Incase the node has more indices than it could fit in the query, it will choose the indices based on D ll as shown in Fig 3. The indices are chosen in a round-robin fashion ensuring that all the indices are propagated. The sort method sorts the index records on D ll in ascending order. Similarly when a node receives the query, it will scan the query Q for the QI records and either replaces or adds them to local cache. The criterion for either replacing or adding is shown in Fig 4. After updating the local index cache, it will search files and the index cache similar to search algorithm Search(Keywords: W) { esult: Host: H for each file f Є F if match(f, W) = true then f If = then for each index record i Є I if BloomFilterMatch(i, W) then H H ( N(i), B(i)) else return If H = then Q makequery(w) Q loadindex(q, I) for each neighbor n Є P forwardquery(n, Q) else h chosehostwithmaxbw(h) requestdownload(h, W) } Fig. 2. Search algorithm for searching W at a querying node with index cache I, set of Files F and set of neighbors P LoadIndex(Query:Q, Index: I) { number: QSize = I sort(i, D ll ) //sorts I on D ll Q clearindex(q) for each index record i Є I Q load(q,n(i),b(i),- (i),s(i),d c (i)) D ll (i) now() QSize QSize + Z if QSize + Z >M then return } Fig. 3. Algorithm for adding index records in Query Q at a node with index cache I and network wide maximum query size M and query index record size Z UpdateIndexInNode(Query: Q, Index: I) { boolean found for each index record r Є found false for each index record i Є I if N(i) = N(r) and (i) = (r) then found true if Dc(i) < Dc(r) then i r if found = false then I I r } Fig. 4. Algorithm for adding index record set of Query Q to a node s index cache I

7 in Fig 2. If it finds a match(s), it will make reply message and includes the addresses and the bandwidth information of all the nodes it found to have the desired object. But it doesn t confirm whether the object really exists in the network. So the result may include the false positives also. If it doesn t find a match, it will forward the query to its neighbors. 4 Simulation esults We used a 1 node random graph generated by GT-ITM [21] with average degree of 1. We used a pure P2P model where there is no distinction among the peers. All peers have equal functionalities. There are 5 distinct objects in the network with the 1 st object being the most popular and 5 th object being the least popular. The objects and queries are distributed according to the observations made in [22]. The replica distribution of these objects is done according to the Zifian distribution with parameter α =.82. The replicas are placed at randomly selected nodes. Queries for these objects also follow the Zifian distribution (α =.82) i.e. the popular objects receive more queries than that of less popular objects. The queries are generated according to a Poisson process with average generating rate at 8 queries per second. For each query, a node is selected randomly to fire that query. The simulation was run for 75 queries. To model the churn scenario, we remove 1% active nodes and insert equal number of new nodes into the system. The new nodes start functioning without any prior knowledge. The objects are replicated onto these new nodes according to Zifian distribution. To model the object deletions and insertions, randomly selected objects are removed from randomly selected nodes and new replicas and new objects are added at randomly selected nodes. The topology change happens every 3 minutes and object relocation happens every 3 minutes during each run. For simulating the search method flooding, the TTL is set to 7 and for k-random walk 5 walkers are used and TTL for each is set to 124. The parameters for Bloom Filter are number of files n= 1, k=6 and maximum query size is 496 bytes. We simulate Flooding (FL), k-andom walk (W), Index Dissemination with Flooding (ITQFL), Index dissemination with k-andom walk (ITQW). The comparison is done in terms of bandwidth consumption, query response time, and false positives. In Fig 5, we show the average messages produced per query. There is 99% reduction in average messages in ITQ approaches. The difference between flooding and random walk is due to forwarding only to few randomly selected neighbors. But the huge difference between ITQ and others is due to the spreading of the object indices through the queries. By spreading indices, the location information of the objects is available within fewer hops of the requesting nodes. As the query is answered within fewer hops, correspondingly the message replication also reduces exponentially. In Fig 6, we compare index propagation through random walk and flooding. In both the approaches, the curve rises steeply for the first few seconds and rises slow after that. This is because; initially both approaches behave just like their counterparts. But the difference is that the initial query traffic carries the indices and spreads to all the nodes on its way. So there is decline in steepness of the curves. There are rises in the steepness of the curve at 184, 385, and 522 seconds indicating

8 the churn scenarios. But it can be clearly seen that the rise in the steepness reduces over next few seconds and becomes normal. Thus our approach adapts to the churn scenarios and stabilizes the network. 1 8 Me s s a ge 6 C ount Mes s age Count IT Q(FL) k=6 IT Q( W) k=6 Flooding a ndomwa lk IT QFL k=6 IT Q W k= Avg Ms gs T ime (s ec) Fig. 5. Average messages per query Fig. 6. CDF of bandwidth consumption Message 2 s T ime (s e c ) Me ssa ge s T ime (s e c ) Fig. 7. Traffic distribution for ITQFL k=3 Fig. 8. Traffic distribution for ITQFL k=7 3 2 Milli se c s e s pons e T ime 4 IT Q(FL) k=6 IT Q( W) k=6 Flooding a ndomwa lk IT QFL k=6 IT Q W k=6 Avg T ime Que r y No Fig. 9. Comparison of avg response time Fig. 1. CDF of query response time Time Unit s Query No 1 % 5 Flooding a ndomw IT Q W IT Q W IT QFL IT QFL % Fig. 11. CDF of response time (ITQFL k=6) Fig. 12. Percent queries answered in one-hop

9 As k increases, the false positive rate reduces and the length of Bloom Filter or BF record increases thus loading fewer records onto the query. This can be observed in Fig 7 and 8. First in Fig 7 there is less query traffic in the starting of the network compared to Fig 8. This is attributed to more query hits that occur in the first few hops and they don t further forward the query. The more query hits are due to high false positive rate. In Table 2, we observe that there are on an average 33.6 false results for every query. As k, increases the false positives decrease considerably. Second as k increases, the number of indices that can be loaded onto the query reduce linearly. Thus it takes time to stabilize the network. The comparison of average query response time is depicted in Fig 9. We see that random walk has maximum search latency. This is attributed to depth first search. There is Table 2. False positives per query in ITQFL k fp drastic reduction in search latencies of ITQ approaches when compared to others. The comparison between search latencies of ITQW and ITQFL is presented in Fig 1. The difference in steepness is due to, first, in random walk, the indices are spread not breadth wise but depth wise. So only few nodes come in contact with the queries. Second the nodes are selected randomly to forward the query. This means a node may be selected several times leaving other nodes not getting selected at all. This way the network has rare chance of getting stabilized. The churn further complicates this. Although in Fig 1, the curve for ITQFL seems to be constant, but if we closely look at it, it looks as in Fig 11. For most of the queries, the curve is flat, indicating that queries are answered in one-hop. The rises in steepness of the curve are due to the churn. But soon the curve becomes flat indicating that the network has recovered from the churn. The percentage of queries answered with the locally available index (one-hop queries) is shown in Fig Conclusion In this paper we propose a novel approach, indexing through querying that utilizes the huge amount of traffic to propagate the indices of the objects. Our approach utilizes the benefits of query forwarding to improve upon the scalability of P2P lookup. It also improves upon the availability in the face of individual failures through index replication. Experimental evaluations have shown that our approach works very efficiently in conjunction with flooding in improving the search efficiency. The search cost is reduced over by 95% and over 97% queries were answered one-hop. We plan to address the free riding problem in the future work. eferences 1 Saroiu, S., Gummadi, K., Dunn,., Gribble, S., Levy H.: An Analysis of Internet Content Delivery Systems. In: Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pp , USENIX Association, Berkeley, CA, USA (22) 2 Gnutella Protocol Specification Version.4

10 3 Kazaa. 4 atnasamy, S., Francis, P., Handley, M., Karp,., Shenker, S.: A Scalable Content Addressable Network. In: Proceedings of the 21 ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM), pp , ACM Press, (21) 5 Stoica, I., Morris,., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. IEEE/ACM Transactions on Networking 11, (23) 6 owstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pp , Springer-Verlag, London (21) 7 Yang B., Patrick, V., Garcia-Molina, H.: Evaluating GUESS and Non-Forwarding Peer-to- Peer Search. In: Proceedings of IEEE 24th International Conference on Distributed Computing Systems (ICDCS), pp , IEEE Computer Society, Washington DC, USA (24) 8 Bloom, B.H.: Space/time trade offs in hash coding with allowable errors. Communications of the ACM, 13(7), (197) 9 Yang, B., Garcia-Molina H.: Improving search in peer-to-peer networks. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), pp. 5, IEEE Computer Society, Washington DC (22) 1 Crespo, A., Garcia-Molina, H.: outing indices for peer-to-peer systems. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), pp , IEEE Computer Society, Washington DC (22) 11 Sean, C.., Kubiatowicz J.: Probabilistic location and routing. In: Proceedings of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM2), pp , IEEE Computer Society, Washington DC (22) 12 Zhang,., Hu, Y.C.: Assisted Peer-to-Peer Search with Partial Indexing, IEEE Transactions on Parallel and Distributed Systems. 18, (27) 13 Praveen, K., Srividya, G., Sridhar, V.: Multi-attribute Based Similar Content Indexing in Hybrid Peer-to-Peer Networks. In: Proceedings of the International conference on Networking and Services (ICNS), pp. 25, IEEE Computer Society, (26) 14 Peng, G., Jun, W., Hailong, C.: ASAP: An Advertisement-based Search Algorithm for Unstructured Peer-to-peer Systems. In: Proceedings of the 27 International Conference on Parallel Processing (ICPP), pp. 8, IEEE Computer Sociey, Wasinghton DC, USA (27) 15 Tang, C., Dwarkadas, S.: Hybrid global-local indexing for efficient peer-to-peer information retrieval. In: Proceedings of the 1st Symposium on Networked Systems Design and Implementation, pp. 16, USENIX Association Berkeley, CA, USA (24) 16 Baeza-Yates,., ibeiro-neto, B.: Modern Information etrieval. Addison Wesley Longman, Boston (1999) 17 Gummadi, K.P., Dunn,.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. ACM SIGOPS Operating Systems eview. 37, , (23) 18 Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceedings of Multimedia Computing and Networking (MMCN) (22) 19 Fan, L., cao, P., Almeida, J., broder, A.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking. 8, (2) 2 Gnutella protocol Zegura, E.W.,Calvert, K.L., Bhattacharjee, S.: How to Model an Internetwork. In: Proceedings of Fifteenth Annual Joint Conference of the IEEE Computer Societies, pp , IEEE Computer Society, New York, (1996) 22 Chu, J., Labonte, K., Levine, B.: Availability and Locality Measurements of Peer-to-Peer File Systems. In: Proceedings of SPIE (22)

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Adaptive Lookup for Unstructured Peer-to-Peer Overlays

Adaptive Lookup for Unstructured Peer-to-Peer Overlays Adaptive Lookup for Unstructured Peer-to-Peer Overlays K Haribabu, Dayakar Reddy, Chittaranjan Hota Computer Science & Information Systems Birla Institute of Technology & Science Pilani, Rajasthan, 333031,

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm Rusheel Jain 1 Computer Science & Information Systems Department BITS Pilani, Hyderabad Campus Hyderabad, A.P. (INDIA) F2008901@bits-hyderabad.ac.in Chittaranjan Hota 2 Computer Science & Information Systems

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Improving Hybrid Keyword-Based Search

Improving Hybrid Keyword-Based Search Improving Hybrid Keyword-Based Search Matei A. Zaharia and Srinivasan Keshav Abstract: We present a hybrid peer-to-peer system architecture for keyword-based free-text search in environments with heterogeneous

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

A Hybrid Structured-Unstructured P2P Search Infrastructure

A Hybrid Structured-Unstructured P2P Search Infrastructure A Hybrid Structured-Unstructured P2P Search Infrastructure Abstract Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based

More information

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha,jdowling,rcnnnghm,rmeier}@cs.tcd.ie

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks

On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks Ali Raza Butt 1, Nipoon Malhotra 1, Sunil Patro 2, and Y. Charlie Hu 1 1 Purdue University, West Lafayette IN 47907,

More information

Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks

Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks 470 Distributed Cycle Minimization Protocol (DCPM) for Peer-to-Peer Networks K Srinivas 1, Dr. Gunamani Jena 2, A Satyamallesh 3 1 Department of Computer science and Engineering, B.V.C.Enggineering College,

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering Bilkent University TR-06800 Ankara, Turkey

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Exploiting Content Localities for Efficient Search in P2P Systems

Exploiting Content Localities for Efficient Search in P2P Systems Exploiting Content Localities for Efficient Search in PP Systems Lei Guo,SongJiang,LiXiao, and Xiaodong Zhang College of William and Mary, Williamsburg, VA 87, USA {lguo,zhang}@cs.wm.edu Los Alamos National

More information

A Server-mediated Peer-to-peer System

A Server-mediated Peer-to-peer System A Server-mediated Peer-to-peer System Kwok, S. H. California State University, Long Beach Chan, K. Y. and Cheung, Y. M. Hong Kong University of Science and Technology A peer-to-peer (P2P) system is a popular

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Simple Determination of Stabilization Bounds for Overlay Networks. are now smaller, faster, and near-omnipresent. Computer ownership has gone from one

Simple Determination of Stabilization Bounds for Overlay Networks. are now smaller, faster, and near-omnipresent. Computer ownership has gone from one Simple Determination of Stabilization Bounds for Overlay Networks A. Introduction The landscape of computing has changed dramatically in the past half-century. Computers are now smaller, faster, and near-omnipresent.

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Adaptively Routing P2P Queries Using Association Analysis

Adaptively Routing P2P Queries Using Association Analysis Adaptively Routing P2P Queries Using Association Analysis Brian D. Connelly, Christopher W. Bowron, Li Xiao, Pang-Ning Tan, and Chen Wang Department of Computer Science and Engineering Michigan State University

More information

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha, jdowling,

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville,

More information

Ultrapeer-Leaf Degree 10. Number of Ultrapeers. % nodes. Ultrapeer-Ultrapeer Degree Leaf-Ultrapeer Degree TTL

Ultrapeer-Leaf Degree 10. Number of Ultrapeers. % nodes. Ultrapeer-Ultrapeer Degree Leaf-Ultrapeer Degree TTL Measurement and Analysis of Ultrapeer-based P2P Search Networks Λ Boon Thau Loo Λ Joseph Hellerstein Λy Ryan Huebsch Λ Scott Shenker Λz Ion Stoica Λ Λ UC Berkeley y Intel Berkeley Research z International

More information

A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING *

A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING * A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING * Nadeem Abdul Hamid Berry College 2277 Martha Berry Hwy. Mount Berry, Georgia 30165 (706) 368-5632 nadeem@acm.org ABSTRACT Peer-to-peer systems (P2P)

More information

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol G. Perera and K. Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING

DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING Ms. V.Sharmila Associate Professor, Department of Computer Science and Engineering, KSR College of

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav School of Computer Science, University of Waterloo, Waterloo, ON, Canada Abstract: We present GAB, a search algorithm

More information

This is the published version:

This is the published version: This is the published version: Zhou, Wanlei and Casey, J. 2008, Reducing cache lookup and publish overhead through locality awareness in P2P web caching, in HPCC 2008 : Proceedings of the 10th IEEE International

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Virtual Direction Routing for Overlay Networks

Virtual Direction Routing for Overlay Networks IEEE PP'9 - Sept. 9-, 9 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng ECSE Department Rensselaer Polytechnic Institute bownan@gmail.com Murat Yuksel CSE Department University of Nevada -

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Efficient Multi-source Data Dissemination in Peer-to-Peer Networks

Efficient Multi-source Data Dissemination in Peer-to-Peer Networks Efficient Multi-source Data Dissemination in Peer-to-Peer Networks Zhenyu Li 1,2, Zengyang Zhu 1,2, Gaogang Xie 1, Zhongcheng Li 1 1 Institute of Computing Technology, Chinese Academy of Sciences 2 Graduate

More information

Neighborhood Signatures for Searching P2P Networks

Neighborhood Signatures for Searching P2P Networks Neighborhood Signatures for Searching P2P Networks Mei Li Wang-Chien Lee Anand Sivasubramaniam Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802 E-Mail:

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Three Layer Hierarchical Model for Chord

Three Layer Hierarchical Model for Chord Three Layer Hierarchical Model for Chord Waqas A. Imtiaz, Shimul Shil, A.K.M Mahfuzur Rahman Abstract Increasing popularity of decentralized Peer-to-Peer (P2P) architecture emphasizes on the need to come

More information

Supporting Multiple-Keyword Search in A Hybrid Structured Peer-to-Peer Network

Supporting Multiple-Keyword Search in A Hybrid Structured Peer-to-Peer Network Supporting Multiple-Keyword Search in A Hybrid Structured Peer-to-Peer Network Xing Jin W.-P. Ken Yiu S.-H. Gary Chan Department of Computer Science The Hong Kong University of Science and Technology Clear

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Mouna Kacimi Max-Planck Institut fur Informatik 66123 Saarbrucken, Germany mkacimi@mpi-inf.mpg.de ABSTRACT Several caching

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Proactive Caching for Better than Single-Hop Lookup Performance

Proactive Caching for Better than Single-Hop Lookup Performance Proactive Caching for Better than Single-Hop Lookup Performance Venugopalan Ramasubramanian and Emin Gün Sirer Cornell University, Ithaca NY 4853 ramasv, egs @cs.cornell.edu Abstract High lookup latencies

More information

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems : A Proactive Low-overhead File Replication Scheme for Structured P2P Systems Haiying Shen Yingwu Zhu Dept. of Computer Science & Computer Engineering Dept. of Computer Science & Software Engineering University

More information

SIL: Modeling and Measuring Scalable Peer-to-Peer Search Networks

SIL: Modeling and Measuring Scalable Peer-to-Peer Search Networks SIL: Modeling and Measuring Scalable Peer-to-Peer Search Networks Brian F. Cooper and Hector Garcia-Molina Department of Computer Science Stanford University Stanford, CA 94305 USA {cooperb,hector}@db.stanford.edu

More information

Improving Search In Peer-to-Peer Systems

Improving Search In Peer-to-Peer Systems Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003 Goals Present alternative searching methods for systems with loose integrity constraints Probabilistically optimize over

More information

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav School of Computer Science, University of Waterloo, Waterloo, ON, Canada matei@matei.ca, keshav@uwaterloo.ca SUMMARY

More information

Real Datasets for File-Sharing Peer-to-Peer Systems

Real Datasets for File-Sharing Peer-to-Peer Systems Real Datasets for File-Sharing Peer-to-Peer Systems Shen Tat Goh 1, Panos Kalnis 1, Spiridon Bakiras 2, and Kian-Lee Tan 1 1 Department of Computer Science, National University of Singapore, 3 Science

More information

CSE 486/586 Distributed Systems

CSE 486/586 Distributed Systems CSE 486/586 Distributed Systems Distributed Hash Tables Slides by Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Evolution of peer-to-peer Central directory (Napster)

More information

Performance Analysis of Restricted Path Flooding Scheme in Distributed P2P Overlay Networks

Performance Analysis of Restricted Path Flooding Scheme in Distributed P2P Overlay Networks 216 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.12, December 2007 Performance Analysis of Restricted Path Flooding Scheme in Distributed P2P Overlay Networks Hyuncheol

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

An Optimal Overlay Topology for Routing Peer-to-Peer Searches

An Optimal Overlay Topology for Routing Peer-to-Peer Searches An Optimal Overlay Topology for Routing Peer-to-Peer Searches Brian F. Cooper Center for Experimental Research in Computer Systems, College of Computing, Georgia Institute of Technology cooperb@cc.gatech.edu

More information

Locating Equivalent Servants over P2P Networks

Locating Equivalent Servants over P2P Networks Locating Equivalent Servants over P2P Networks KUSUMA. APARNA LAKSHMI 1 Dr.K.V.V.S.NARAYANA MURTHY 2 Prof.M.VAMSI KRISHNA 3 1. MTECH(CSE), Chaitanya Institute of Science & Technology 2. Prof & Head, Department

More information

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer 908 JOURNAL OF NETWORKS, VOL. 9, NO. 4, APRIL 2014 Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer Sri Wahjuni, A.A.Putri Ratna, and Kalamullah Ramli Department of

More information

A Hybrid Searching Scheme in Unstructured P2P Networks

A Hybrid Searching Scheme in Unstructured P2P Networks A Hybrid Searching Scheme in Unstructured P2P Networks Xiuqi Li and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {xli, jie}@cse.fau.edu Abstract

More information

Information Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali

Information Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali Information Retrieval in Peer to Peer Systems Sharif University of Technology Fall 2005 Dr Hassan Abolhassani Author: Seyyed Mohsen Jamali [Slide 2] Introduction Peer-to-Peer systems are application layer

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

Performance Modelling of Peer-to-Peer Routing

Performance Modelling of Peer-to-Peer Routing Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk

More information

A Survey of Peer-to-Peer Systems

A Survey of Peer-to-Peer Systems A Survey of Peer-to-Peer Systems Kostas Stefanidis Department of Computer Science, University of Ioannina, Greece kstef@cs.uoi.gr Abstract Peer-to-Peer systems have become, in a short period of time, one

More information

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information