Topology Evolution in P2P Distributed Networks
|
|
- Garry Lawson
- 5 years ago
- Views:
Transcription
1 Topology Evolution in P2P Distributed Networks German Sakaryan Computer Science Dept. University of Rostock 1851 Rostock, Germany Herwig Unger Computer Science Dept. University of Rostock 1851 Rostock, Germany ABSTRACT P2P-networks become more and more interesting not only because of the emergence of file sharing systems like Gnutella. Such decentralized systems have a lot of advantages compared to centralized client-server systems. However, information search is still a central problem in such P2P web communities, since the used complete search with message chains may cause high search response times. In this paper we emphasize that these search times can be significantly influenced by the message forward algorithm and by the topology of the community, which can be easily changed by respective, local executed algorithms. For doing so, content and traffic oriented methods were proposed. Their efficiency has been proved through a simulation and the respective results. KEY WORDS P2P, Information Search, WEB Communities the algorithms of Content Oriented Information Search as well as algorithms to change the topology of the community based on Content and Traffic Oriented Restructuring were presented. We demonstrate the impact of the proposed algorithms on the information search and proof that it becomes more effective. Finally, it was shown that traffic problems caused by overloaded nodes may be avoided. For this goal, in this paper static communities are considered, i.e. the number of nodes in the community is a constant one. Therefore, the paper is structured as following. The below section 2 gives a general definition of the community system, describes our model of the information used, and presents model of the community s node. Section 3 introduces algorithm of the information search, and approaches to topology changes based on content and traffic restructuring. In the Section 4 we present used simulation tool and discuss the achieved empirical results. 1 Introduction Significant research efforts have recently been invested in the development of peer-to-peer (P2P) computing systems, not only due to the high popularity of file sharing systems like Gnutella [1], Napster [2], Freenet [3]. Due to its flexibility, reliability and adaptivity P2P solutions can overcome a lot of disadvantages known from client-server systems, and can fit to dynamically changing Internet environment [4]. Also, P2P communities open new opportunities for Internet marketing and business oriented approaches [5], [6]. However, the efficient management of distributed P2P networks and especially the organization of an efficient search result in a lot of new problems and tasks to be solved. The big share of Internet users still using dial-up modems, which makes a lot of connections slow and unreliable. They can hardly efficiently handle incoming information requests, analyze them and proceed. In addition to dynamically changeable structure of such Web communities (nodes can join and leave community), all this leads to killed requests and increasing of search time. We intend to show that the topology of the community plays an important role for community operations, since it significantly influences on the time needed for information search and on traffic in the community. In the given paper a conceptual approach for managing the topology of a P2P community, 2 P2P Web Community 2.1 Structure of the Community P2P Communities are groups of objects (e.g. computers) sharing a common interest. In such a manner, at least a communication between the community members is possible. Communities are created as logical structure over the Internet and includes different members - nodes. Mostly the community topology is defined by the neighborhood relations kept in every node s local warehouse. The topology can be modeled as a directed graph [7], which can be characterized by diameter, node s degree, and connectivity. Different models can be used to build and to analyze community topology: random graphs, Erdos and Renyi [8] model, edge-reassigning Small-World Network by Watts and Strogatz [9] and others. For computation purposes each node in the community has a modular structure, additionally (see. Fig 1) containing the following components: Node s profile (PR). Contains basic data about the node: informational profile (see Sec.(2.2)), address of the node (IP), and bandwidth. Queue Module (QM). Includes buffer to store incoming messages.
2 7 Processing module (PM). Includes functions and procedures for community operations like: information search, communication with user, restructuring, traffic handling and others. Warehouse module (WM). Contains list of neighbors, their informational profiles and bandwidth. Informational Module (IM). Contains information which is stored locally on the given node and shared between other community members. User Profile. Is used to simulate activity of the node s user during community simulation. W M C I M C U s e r P r o f i l e Q M I M U S ER N O D E P R P M WM Figure 1. Community Node Model. W M C I M C Normally, message chain mechanisms are used for communication in distributed P2P networks. A message chain circulates between community nodes and can be modified. It is born on starting node to fulfill particular task. Message has a limited size plan including the addresses of the visited nodes, some parts of their informational profiles, bandwidth, and time spent there. In addition to plan, message may keep extra data like starting time, hop counter, priority etc. Important to note that anonymity of the nodes can be maintained by reducing size of the message chain s plan. Messages can be distinguished by the task they are generated for. Information messages (IMC) are used for search, warning messages (WMC) used to inform others about critical situations, clustering messages (CMC) for participating in clustering, and propagation message chains (PMC) to propagate new information. 2.2 Information in the Community All information kept in the community is limited to the community interests and can be categorized for limited number of categories and represented as informational hierarchy. Here only a short summary of what is really needed for this paper is given. Each category of the information can be structured and described using the extensible Markup Language (XML) tags [1]. The tags are organized in hierarchical manner(tree). At the top of the tree there is a general category of information. Subcategories are represented on the lower levels of the tree. All information in the community can be presented as set: (1) where, j =1..n -set of information pieces which belong to the same category, and n- total number of tags. Information is represented by following triplet:! #"$" (2) where T- is sequences of tags (XML) in the information hierarchy, V- is the real informational content and P(T,V) - is the probability corresponding to how often this information is requested by an user. Probability is used to create an adequate simulation model. Empirical results obtained from the analysis of the request structure in a Gnutella network [11], show the strong correspondence between information and its popularity. In real communities these probabilities can be only estimated by analyzing information requests within representative subgroup of users/nodes. Any information is described by profile, which includes position in the hierarchy and probability: '&() *" +),!)"$" Informational profile.- of profiles of the informations kept on the given node. /- 1&() (3) / of the node / is defined as a set / "$" &(9:;"= >@?,8 /ACBEDCF GIH For the creation of the informational profile an information with J 9K"ML1NO PRQ S is considered. 3 Main Algorithms 3.1 Content Oriented Information Search To locate information in accordance with user s request a message chain travels over the community to find at least one node with the required data. The hop counter is used to limit the life time of the message and prevent extra meaningless network load. At the moment of the message generation the counter is initialized by value bigger than zero and is decremented every hop. As soon as a target information is found the message is sent back to its starting node informing it about the IP address of the found node. The path of the message is stored in the plan. Two main concepts for forwarding message over the community are applicable: Random forwarding. The message is forwarded randomly. For big communities the probability of locating the required information by one message is very low. The only solution to be done is to broadcast many message chains like in Napster or Gnutella. (4)
3 Content oriented forwarding. The basic idea behind content oriented forwarding is that the profile of the requested information and the informational profiles of the neighbor nodes #- are considered. The algorithm forwards the message to the neighbor with the most similar informational profile compared to requested info. The neighbor is chosen as the best node if: - " - As it will be shown later the community topology is evolving and nodes with similar profiles organize closer connected subcommunities. The system uses not only the local warehouse to choose the best node, but also analyzes the plans of the messages pending in the incoming queue. These messages organize a kind of virtual warehouse. 3.2 Principals of Topology Evolution The topology (link structure) of the community can be modeled as a directed graph, which has a number of specific features to be considered: Changing with time (evolution). This trend is caused by mainly two reasons. First, because of the uncoordinated and unpredictable addition and removal of nodes. These processes can be modeled by Poisson distribution and an exponential distribution accordingly [12]. Second, algorithms may run and self-organize a community so that topology can be changed (cluster building, content oriented structure creation etc.). 9IP (5) Due to lack of global knowledge, only local knowledge about community graph can be used for any structuring algorithms. Structuring algorithms should consider the distribution of the information between community nodes. The effectiveness and time taken for information search highly depends on the topology of the community and the actual traffic situations. In real networks messages on overloaded nodes are lost, that requires extra time to locate information. In order to target these two issues two restructuring approaches are proposed: Content oriented restructuring. Links between nodes shall be changed in order to organize local, stronger connected subcommunities of nodes with similar interests. Content restructuring deals with two issues: internal and external restructuring. First organizes groups of machines with the very similar information interests. External restructuring targets to organize links between different groups/ subcommunities. Traffic oriented restructuring. This kind of restructuring is caused by local traffic problems and leads to the creation of alternative paths around the overloaded nodes. Both approaches change the topology of the community dynamically, thus the changeable part of the P2P communities is ideally organized. Content restructuring uses knowledge about nodes visited by traveling messages, in such a way extra traffic for only restructuring purposes is avoided. These changes are faster than global topology changes caused by the dynamics of the P2P Web communities. The creation of the content oriented topology may lead to a traffic concentration around nodes with the most requested information. In this case, the traffic restructuring is required. And vice versa only traffic restructuring partially breaks content oriented topology and may lead to increasing search time. That is why combination of the two approaches is mostly indicated Content Oriented Restructuring The important task of this algorithm is to organize subgroups of nodes with similar informational interests and create intergroup connections. Accordingly, the warehouse of a node is divided in two parts: internal (neighbors with similar info) and external (neighbors from different groups). The executed locally algorithm should have following features: Information about other nodes in the community is taken from the plans of the traveling search messages generated by given node. The algorithm starts if either searching time is bigger than it was expected or the number of hops made bigger then it should be. Algorithm analyses the plan of the message chain, extracts candidates for neighbors and updates the content of the internal and external part of the node s warehouse. The distance between candidate and given node is calculated using formula: / /- - " /- /- (6) - where /- - info profile of the given node, and #- is a neighbors informational profile. The internal part of the node s warehouse is updated by links to new nodes with similar informational profile to the considered one. The external part by nodes with lowest similarity Traffic Oriented Restructuring Restructuring based on traffic leads to dynamical but local changes around the overloaded node. Every node in the community runs the same algorithm, which allows to detect critical situations and informs pre-neighbors about it. The following steps are executed: 1. Check, if the number of messages in the incoming queue is bigger than a critical value.
4 2. If yes, generate a warning messages (WMC) and send them out to pre- neighbors. The data carried by the WMC include the expected handling time of the pending message, which was sent by preneighbor to overloaded node. The data also include list of outgoing neighbors of the overloaded node. The list is used for the creation of roundabout ways. Outgoing neighbors are chosen randomly from the node s internal warehouse, so the pre-neighbor may reinstall its link to the new node with the similar information (as overloaded). In that way, content oriented structure of the community is left almost unchanged. When a node receives a WMC it deletes the link to the overloaded node with some probability and add a new link to the internal and external warehouses. In both cases the best nodes from information point of view are chosen. New neighbors are picked up from received list of neighbors. The probability of the link deletion can be either dependable on an expected handling time or to be a fixed parameter (empirically obtained). The probability of deletion prevents overloaded node from being isolated. Traffic restructuring helps to spread local traffic more equally. 4 Simulating Community 4.1 Concept and Principals of Simulation The main task of the simulation is to investigate how the proposed algorithms of content search, content and traffic restructuring influence on the information search in P2P communities. The developed simulation tool includes the following components Fig (2): Virtual Network Generator and Statistic Collector (VNGSC). (see Fig (2))VNGSC generates a community consisting of the nodes with assigned informational profiles and initial topology and collects statistic about the community operations. Simulation Model of the node. The model simulates the behavior of community nodes and generates information requests (through User Profile module). Message Chain Delivery Mechanism (MCDM). The MCDM is used for message chain delivery and routing (analog to physical infrastructure). N O D E i S e n d R e s e a r c h e r s V i r t u a l N e t w o r k G e n e r a t o r a n d S t a t i s t i c C ol l e c t o r ( V N G S C ) P 2 P ( v i r t u a l ) R e c e i v e R e c e i v e Me s s a g e C h a i n D e l i v e r y Me c h a n i s m ( MC D M) ( r o u t i n g ) Figure 2. Simulation Tool. NO DE k S e n d IMC and WMC types messages were used. The number of messages generated within one simulation run was limited to the number of nodes in the community. However, these limitations are close to the reality because a user mostly places another information request when it has processed the reply from the previous one. 4.2 Experimental Results To get reliable results the size of the community should be large enough to create several reasonably big subgroups (about 1 to 15 groups with 1 participants). On the other hand, simulating large communities becomes a problem, since simulation times will rapidly increase. Considering both arguments, a community size of 248 nodes was chosen. In such a manner, 2 warehouse entries equally divided between internal and external parts generate a graph close to real conditions. The incoming queue size is equal to 2 with a critical level (more messages than critical level node is overloaded) of 15. All messages may make 2 hops. The plan size was set to 2. These values were chosen to prevent messages to come back to the starting node too often and to decrease the time of the restructuring. During the experiments all combinations of different approaches (table 1) were investigated for the same initial community topology. All information in the simulated community is divided on to 4 subgroups A...D [11]. Information of the group A is requested 4 times, B-3, C-2 and D-1. Two level information hierarchy was considered. The information requests are generated randomly with given probability. The initial topology of the community was created as a random graph, which may not be strongly connected. We assume that, all nodes have an identical characteristics (warehouse size, incoming queue size, and identical software). All messages in the system have the same plan length and initial value of the hop counter. For simulation Algorithm Random Forward Content Forward No Restructuring Content Restructuring Traffic Restructuring Both Restructurings Table 1 Abbreviation RF CF NR CR TR CR+TR
5 SUM OF HOPS RF,NR RF,CR RF,TR RF,CR+TR Figure 3. Average hops per positive result. RF,NR RF,CR RF,TR RF,CR+TR Figure 6. Killed vs. generated requests. 31 NUMBER OF MESSAGES RF, TR CF, TR S IMC WMC SUM OF HOPS Figure 4. Overload in the Community. Figure 7. Content Oriented Forwarding Hops/Result RF,NR RF,CR RF,TR RF,CR+TR Figure 5. Positive results vs. generated requests. Figure 8. Content Oriented Forwarding Killed/Requests.
6 Each simulation run consists of the 248 control cycles, so that messages have at least theoretical possibility to visit all nodes. When node receives the control it performs actions according to the simulated combination. At the end of one run statistics is collected. The next run starts with topology achieved during the last run. Each combination was tested sequentially 4 runs and average statistic data was calculated. Different methods were compared using following parameters: 1. Ratio of total number of hops vs. number of positive results (messages which found requested info). 2. Ratio of positive results vs. number of generated requests. Value of 1 means all requests are satisfied. 3. Ratio of killed messages vs. number of generated requests. The conducted experiments demonstrate advantages of the content forwarding over random one. The average number of hops is at least 1 times less (see Fig(3)). The ratio of successful results is hereby 9 compared to 4 of the random oriented search (see Fig. (5)). The number of killed messages is extremely low vs. those in random search systems (see Fig. (6)). Experiments have shown that the use of traffic restructuring considerably decreases number of killed messages (lost users requests) (see Fig. (6, 8)) in both combinations with random and content forwarding. The additional traffic (see Fig.(4)) created by warning messages is estimated for combination RF+TR -is about 14, for RF+CR+TR- 47, for CR+TR- 9, and for CF+CR+TR - is only 3 more messages. The application of content restructuring makes no sense for systems which do not use content structure of the community (like random forwarding search). In the content search systems it will create content oriented topology, therefore information is located faster, number of hops and number of killed messages are decreased (see Fig. (7, 8)). Experiments proved our expectations that due to mutual influences the use of content forward, content and traffic restructuring gives the best results. 5 Conclusion and Outlook. In given paper several approaches to improve the search efficiency in P2P communities were presented. The main principals of a content oriented search as well as the principals of a topology evolution were described. Two new algorithms which care about content oriented structure of the community and traffic were introduced. With the presented community simulation concept and the respective simulation tool some empirical experiments were done. The results proved our expectations and demonstrated effectiveness of the proposed methods. Experiments showed that the combination of all three approaches would considerably improve average system performance. In our future work it is intended to investigate the dynamics of the community structure more detailed, especially with respect to the steady changing number of participating nodes. In addition, formation and management of subcommunities must be discussed, since the needed quality of service cannot be guaranteed in too large communities. References [1] Gnutella. June 22. [2] Napster [3] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 29:46 59, 2. [4] Herwig Unger and Markus Wulff. Cluster-building in P2P-community networks. In Parallel and Distributed Computing and Systems (PDCS 22), pages , Cambridge, USA, 22. [5] Rudiger Grimm and Jurgen Nutzel. A friendly peerto-peer file sharing system with profit but without copy protection. In Second International Workshop, IICS 22, pages , Kuhlungsborn, Germany, June 22. [6] Ulrike Lechner. Peer-to-peer beyond file sharing. In Second International Workshop, IICS 22, pages , Kuhlungsborn, Germany, June 22. [7] Narsingh Deo and Pankai Gupta. World Wide Web: A graph-theoretic perspective. Technical Report CS- TR-1-1, School of Computer Science, University of Central Florida, Orlando, FL 32816, USA, March 21. [8] P. Erdos and A. Renyi. On the evolution of random graphs. Publications of the Mathematical Institute of the Hungarian Academy of Science, 5:17 61, 196. [9] D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393:44 442, June [1] A. Ceponkus and F. Hoodbhoy. Applied XML. Wiley Computer Publishing USA, USA, [11] Nesreen Zadah. Searching in P2P-network communities. Technical report, Department of Computer Science, Rostock University, September 22. [12] Gopal Pandurangan, Prabhakar Raghavan, and Eli Upfal. Building low-diameter P2P networks. In 42th IEEE Symp. on Foundations of Computer Science, pages 56 64, Las Vegas, USA, 21.
DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS
DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,
More informationFUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network
8th Netties Conference Technische Universität Ilmenau September 30th to October 2nd 2002 T. Zahn / H. Ritter / J. Schiller / H. Schweppe FUtella Analysis and Implementation of a Content- Based Peer-to-Peer
More informationAn Optimized Search Mechanism for Large Distributed Systems
An Optimized Search Mechanism for Large Distributed Systems Herwig Unger 1, Thomas Böhme, Markus Wulff 1, Gilbert Babin 3, and Peter Kropf 1 Fachbereich Informatik Universität Rostock D-1051 Rostock, Germany
More informationThwarting Traceback Attack on Freenet
Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract
More informationEARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.
: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationBackup and Recovery Scheme for Distributed e-learning System
Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More information1 Random Graph Models for Networks
Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture : Jan 6, 0 Scribes: Geoffrey Fairchild and Jason Fries Random Graph Models for Networks. Graph Modeling A random graph is a
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationProperties of Biological Networks
Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási
More informationIan Clarke Oskar Sandberg
Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationA Generating Function Approach to Analyze Random Graphs
A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation
More informationCHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION
CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant
More informationDistributed Network Routing Algorithms Table for Small World Networks
Distributed Network Routing Algorithms Table for Small World Networks Mudit Dholakia 1 1 Department of Computer Engineering, VVP Engineering College, Rajkot, 360005, India, Email:muditdholakia@gmail.com
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationBuilding Low-Diameter Peer-to-Peer Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL 21, NO 6, AUGUST 2003 995 Building Low-Diameter Peer-to-Peer Networks Gopal Pandurangan, Member, IEEE, Prabhakar Raghavan, Fellow, IEEE, and Eli Upfal,
More informationCS590R - Algorithms for communication networks Lecture 19 Peer-to-Peer Networks (continued)
CS590R - Algorithms for communication networks Lecture 19 Peer-to-Peer Networks (continued) Lecturer: Gopal Pandurangan Scribe: Ossama. ounis Department of Computer Sciences Purdue University 1. Introduction
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationModifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries
Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark
More informationAutonomic Multi-Server Distribution in Flash Crowds Alleviation Network
Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network Merdan Atajanov Graduate School of Science and Engineering Saitama University Saitama 338-8570, Japan Toshihiko Shimokawa Faculty
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationAn Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 2, FEBRUARY 2007 145 An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity Chen Wang, Student Member, IEEE, and Li Xiao,
More informationParallel Evaluation of Hopfield Neural Networks
Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationBuilding Low-Diameter P2P Networks
Building Low-iameter PP etworks Gopal Pandurangan Λ Prabhakar Raghavan y Eli Upfal Λ Abstract In a peer-to-peer (PP) network, nodes connect into an existing network and participate in providing and availing
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationOverlay (and P2P) Networks
Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationRECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationKademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres
: A peer-to peer information system based on XOR Metric,by P. Maymounkov and D. Mazieres March 10, 2009 : A peer-to peer information system based on XOR Features From past p2p experiences, it has been
More informationLesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008
Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial
More informationSimulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report
Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277
More informationGraph Structure Over Time
Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationLNET MULTI-RAIL RESILIENCY
13th ANNUAL WORKSHOP 2017 LNET MULTI-RAIL RESILIENCY Amir Shehata, Lustre Network Engineer Intel Corp March 29th, 2017 OUTLINE Multi-Rail Recap Base Multi-Rail Dynamic Discovery Multi-Rail performance
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationNCS Calculation Method for Streaming Applications
NCS Calculation Method for Streaming Applications M.A. Albu, P. v. d. Stok, J.J. Lukkien Technische Universiteit Eindhoven, Philips Research Laboratories E-mail:m.a.albu@tue.nl, peter.van.der.stok@philips.com,
More informationDesigning Peer-to-Peer Systems for Business-to-Business Environments
Designing Peer-to-Peer Systems for Business-to-Business Environments Davide Carboni, Massimo Deriu, Cristian Lai and Antonio Pintus CRS4 (Center for Advanced Studies, Research and Development in Sardinia)
More informationAnalysis of Broadcast Authentication Mechanism in Selected Network Topologies
RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationConstructing a G(N, p) Network
Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most
More informationREALISATION OF AN INTELLIGENT AND CONTINUOUS PROCESS CONNECTION IN SUBSTATIONS
REALISATION OF AN INTELLIGENT AND CONTINUOUS PROCESS CONNECTION IN SUBSTATIONS Christina SÜFKE Carsten HAVERKAMP Christian WEHLING Westnetz GmbH - Germany Westnetz GmbH - Germany Westnetz GmbH - Germany
More informationA Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity
A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More information6. Peer-to-peer (P2P) networks I.
6. Peer-to-peer (P2P) networks I. PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (FI MU) 6. P2P networks I. Autumn 2010 1 / 46 Lecture Overview
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationLocating Equivalent Servants over P2P Networks
Locating Equivalent Servants over P2P Networks KUSUMA. APARNA LAKSHMI 1 Dr.K.V.V.S.NARAYANA MURTHY 2 Prof.M.VAMSI KRISHNA 3 1. MTECH(CSE), Chaitanya Institute of Science & Technology 2. Prof & Head, Department
More informationOctoshape. Commercial hosting not cable to home, founded 2003
Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server
More informationCommunication Fundamentals in Computer Networks
Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationUnit background and administrivia. Foundations of Peer-to- Peer Applications & Systems
A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/
More informationAdvanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationEffective File Replication and Consistency Maintenance Mechanism in P2P Systems
Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationCSCI5070 Advanced Topics in Social Computing
CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of
More informationLecture 2: January 24
CMPSCI 677 Operating Systems Spring 2017 Lecture 2: January 24 Lecturer: Prashant Shenoy Scribe: Phuthipong Bovornkeeratiroj 2.1 Lecture 2 Distributed systems fall into one of the architectures teaching
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationLECTURE 11. Memory Hierarchy
LECTURE 11 Memory Hierarchy MEMORY HIERARCHY When it comes to memory, there are two universally desirable properties: Large Size: ideally, we want to never have to worry about running out of memory. Speed
More informationThe Complex Network Phenomena. and Their Origin
The Complex Network Phenomena and Their Origin An Annotated Bibliography ESL 33C 003180159 Instructor: Gerriet Janssen Match 18, 2004 Introduction A coupled system can be described as a complex network,
More informationConstructing a G(N, p) Network
Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,
More informationTable of Contents Chapter 1 MSTP Configuration
Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation
More informationDynamic Routing and Resource Allocation in WDM Transport Networks
Dynamic Routing and Resource Allocation in WDM Transport Networks Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering (IND), Germany Email: spaeth@ind.uni-stuttgart.de
More informationPERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS
PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS Cristina Hava & Liam Murphy 1 Abstract The World Wide Web (WWW, or Web) is one of the most important Internet services, and has been largely responsible
More informationChapter 3. Design of Grid Scheduler. 3.1 Introduction
Chapter 3 Design of Grid Scheduler The scheduler component of the grid is responsible to prepare the job ques for grid resources. The research in design of grid schedulers has given various topologies
More informationA Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs
A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,
More informationA New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture
A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationQoS Provisioning Using IPv6 Flow Label In the Internet
QoS Provisioning Using IPv6 Flow Label In the Internet Xiaohua Tang, Junhua Tang, Guang-in Huang and Chee-Kheong Siew Contact: Junhua Tang, lock S2, School of EEE Nanyang Technological University, Singapore,
More informationChapter 5. A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO)
A Bandwidth Sensitive Routing for Network Mobility (BSRNEMO) CHAPTER - 5 A BANDWIDTH-SENSITIVE ROUTING FOR NETWORK MOBILITY He profits most who serves best. -Arthur F. Sheldon 5.1 Background It is very
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationA Search Theoretical Approach to P2P Networks: Analysis of Learning
A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.
More informationFile Sharing in Less structured P2P Systems
File Sharing in Less structured P2P Systems. Bhosale S.P. 1, Sarkar A.R. 2 Computer Science And Engg. Dept., SVERI s College of Engineering Pandharpur Solapur, India1 Asst.Prof, Computer Science And Engg.
More informationThe Prioritized and Distributed Synchronization in Distributed Groups
The Prioritized and Distributed Synchronization in Distributed Groups Michel Trehel and hmed Housni Université de Franche Comté, 16, route de Gray 25000 Besançon France, {trehel, housni} @lifc.univ-fcomte.fr
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationPERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK
PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationBitTorrent Fairness Analysis
BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationBasic Switch Organization
NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization
More informationA local area network that employs either a full mesh topology or partial mesh topology
and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh
More information