Exploiting Local Popularity To Prune Routing Indices In Peer-to-Peer System

Size: px
Start display at page:

Download "Exploiting Local Popularity To Prune Routing Indices In Peer-to-Peer System"

Transcription

1 Exploiting Local Popularity To Prune Routing Indices In Peer-to-Peer System Stephane Bressan Department of Computer Science National University of Singapore Achmad Nizar Hidayanto Faculty of Computer Science University of Indonesia {nizar, Zainal A. Hasibuan Abstract Routing in unstructured peer-to-peer system relies either on broadcasting (also called flooding) or on Routing Indices. An approach using Routing Indices is only scalable if the Routing Indices are of manageable size. In this paper, we present a strategy to prune Routing Indices based on the popularity of resources. The Routing Indices maintain routing information for queries to the most popular resources only. Queries to other resources are routed randomly. The popularity of resources is learned at each node of the network for each Routing Index thanks to a replacement strategy. We comparatively evaluate the performance of the local popularity method with the one of a global popularity method for the pruning of Routing Indices in both static and dynamic environments. We compare the effectiveness of two standard replacement strategies: Least Frequently Used (LFU) and Least Recently Used (LRU). Our results confirm the efficiency and effectiveness of the pruning of Routing Indices based on local popularity of resources in unstructured peer-to-peer networks. I. INTRODUCTION Peer-to-peer technology can be divided into two main classes according to the level of organization of the nodes and resources it assumes: namely structured and unstructured peerto-peer architectures. In the structured architectures such as [1], [2], [3], nodes are connected to each other and resources or the records are moved according to some mapping techniques (usually hashing). In unstructured architectures such as [4], [5], nodes are connected to each other as they join the network and resources are not being moved but hosted on site. Hence, searching for a resource requires to either broadcast the request or use routing information. The design of Routing Index then becomes a critical aspect of an efficient, effective and scalable system. Our contribution in this paper is two-fold: 1) a general approach to prune Routing Indices by learning the popularity of resources in the local context, 2) we comparatively evaluate the performance of the local popularity method with the one of a global popularity method for the pruning of Routing Indices in both static and dynamic environments. The pruning based on global popularity is a method we have presented and studied in [6]. In the next section we present a brief overview of the main related work on searching and routing strategies in unstructured peer-to-peer systems. As in previous works on routing in unstructured peer-to-peer systems (see [6] and [7]), we are using a reinforcement learning approach to learn the routing information called Q-routing. We briefly recall the principles underlying reinforcement learning in section III. We present the Routing Indices, routing strategy and proposed strategy to prune Routing Indices in section IV. In section V we evaluate and analyze the performance of the approach we propose under static and dynamic environments. In the last section we present our conclusions. II. RELATED WORKS Let us first recall the outline of the respective architectures of the two main operational unstructured peer-to-peer systems: Gnutella [4] and Freenet [5]. Gnutella is a decentralized filesharing system whose participants form a virtual network communicating from peer to peer via the Gnutella protocol, which consists of 5 basic message types: ping, pong, query, queryhit and push. These messages are routed to their destination using constrained broadcast by decrementing the message s time-tolive field. Freenet, an anonymous peer-to-peer storage system, is decentralized, symmetric and automatically adapts when nodes leaving and joining. Freenet does not assign responsibility for documents to specific servers; instead, its lookups take the form of searches for cached copies. This allows Freenet to provide a degree of anonymity, but prevents it from guaranteeing retrieval of existing documents or from providing low bounds on retrieval costs. The authors of [8] have introduced a more interesting concept than constrained broadcasting for the routing of requests in unstructured peer-to-peer systems, namely Routing Indices (RI). RI are tables located and used at individual nodes of the network to forward queries to designated (by the content of the table) neighbors that are likely to have the answers needed. When a query arrived at a node, the node will use the RI to select neighbor nodes and forward the query to it. The authors of [8] proposed 3 different types of RI: Compound

2 2 RI, Hop-count RI, and Exponential RI. Compound RI provides the number of resources that can be obtained when a query was forwarded to a selected neighbor. While Compound RI provides only information about the number of resources, it provides no distance information. Hop-count RI added the distance information to the RI. Exponential RI also provides both kind of information but present them in a different way than the one of Hop-count RI. The RI are constructed by propagating local information to neighboring nodes at a fixed interval or when the changes in the local indices have reached a certain threshold. In the proposed scheme, resources in the network are classified into different classes and indexing is done with these classes. While this reduces the size of the index, it prevents finer granularity. We have shown in [6] and [7] that Routing Indices can be made adaptive thanks to a reinforcement learning approach to their construction and maintenance. III. BACKGROUND A. Peer-to-Peer Search and Routing Indices Generally, searching mechanism in peer-to-peer systems can be divided into two main components: resource locating and routing. In resource locating, given a resource id, the challenge is to locate the resource in a minimal time to yield better performance and response time. In routing, the challenge is to efficiently route a resource request to the next node in order to achieve minimal time. This is usually done with the help of Routing Indices. Routing Indices, which are maintained at each node, store the cost of routing requests for resources via each of its neighbors. In our early work [6], we have developed an adaptive routing mechanism that relies on the Q-Routing algorithm for learning the routing information. Each node in the network maintains a Routing Index called the Q-table that, for each neighbor node, stores the estimated time that a query may take to reach a node that hosts the requested resource. We have shown that the algorithm is effective and leads to converging and efficient routing time. In [6], we experimented with various techniques for the pruning of the Routing Indices. We showed that the best criteria is the popularity of resources (as opposed for instance to the distance of their location to the local node). Yet, as noted at the time, we assumed that the distribution of the popularity of resources was known and global. This is the hypothesis that we challenge in this paper. In [7],we have extended the adaptive routing approach to keyword search. Reinforcement learning estimated both routing time and relevance. Routing is then a compromise between efficiency and effectiveness. We showed how users can tune this compromise, as well as we propose a device that automatically tune the compromise in function of the network resources. In this paper, we focus on pruning strategies for Routing Indices. These pruning strategies are very important to decrease the size of the Routing Indices at each node. We define the routing and searching problem in peer-to-peer networks as follows. We consider a set of nodes and their Routing Indices, P = (p 1, ri 1 ),..., (p n, ri n ), and a set of resources, R = r 1,..., r m, located on the nodes and identified by the set of keys K = k 1,..., k m. Given a request of the form locate(k i ), i.e. a request to locate resource r i, a node receiving this request must make a local decision as to which of its neighbors to forward the request based on information from its Routing Index. B. Reinforcement Learning A reinforcement learning agent [9] learns from its interactions with its environment. In a given state, the reinforcement learning agent selects the next action according to a model which constantly constructs and updates based on the reward that it receives when trying the different actions. A routing agent could, for instance, favor an action that yields the minimum estimated time to destination. Notice that, in order to continuously learn about its environment, the agent must occasionally depart from its base strategy and try random actions. Reinforcement learning has been successfully applied to many domains, among which network routing. There are numerous forms and variants of reinforcement learning that have been proposed for various network routing problems: Q-Routing [10], Dual Q-Routing [11], Confidence-based Q-Routing and Dual Confidence-based Q-Routing [12], etc. Experiment in [12] showed that confidence-based yields the best performance among all of them but requires large storage. For the sake of simplicity and scalability we chose Q-Routing. In Q-Routing, a node that receives a request for a resource and hosts the resource then provides the resource to the original requester otherwise forwards the request according to the reinforcement learning strategy. It adopts forward propagation strategy to estimate status of the network by maintaining a table called Q-table that contains Q-value Q(n, r) which quantifies the expected reinforcement when a request for a resource r is sent to n. Such algorithms can outperform shortest-paths algorithms such as Bellman-Ford for they are able to estimate routing time taking into account the traffic. IV. DESIGN At each node of the peer-to-peer network, we maintain a Routing Index. The values it contains are estimates of the routing time of a request to the corresponding resource. We use reinforcement learning, namely Q-routing, for the maintenance of the values stored in the Routing Indices and routing of the requests. Storage capacity at each node is limited. A Routing Index cannot store information about all possible requests. This does not matter since some requests are so infrequent (the resources are not popular) that a longer service time would not impact the overall performance of the system. Thus we can view Routing Indices as caches. We may only want to store important information that will be accessed frequently due to limited size of the cache compare to the number of information that has to be stored. Fortunately, we can use a number of page replacement algorithms to control the information that

3 3 should be moved in and out of the cache. Thus, we borrow the mechanism to learn the popularity of the resources in the local context. In the next subsections, we will recall our routing strategy design and our proposed pruning strategy that will be incorporated into our routing strategy. A. Routing Strategy We employ Q-Routing [10] as our routing technique. Q- Routing is an adaptive routing strategy that uses Q-learning, a reinforcement learning algorithm. Q-Routing has been studied in various network routing literatures and the performance studies showed that it is able to adapt to the network traffic. In Q-learning [9], the states and the possible actions in a given state are discrete and finite in number. It uses a set of values termed Q-values when learning. Each Q-value is denoted by Q(s, a) where s is a given state and a is the action taken. In general, Q-value represents the expected reinforcement when the action a is being taken in a state s. Given the current state of the network, Q-Routing algorithm learns and finds an optimal routing policy from the Q-values distributed over all nodes in the network. Each node p in the network has its own view of the state of the network through a table that stores all the Q-value, Q p (p, r), where r R, a set of resource objects in the peer-to-peer network and p N(p) the set of all neighbors of node p. Q p (p, r) is defined as the best estimated time that a query takes to reach the node that hosts the resource r from node p through its neighbor p. The Q-value, Q p (p, r) can be represented by the following mathematical equation: Q p (p, r) = q p + δ + Q p (p, r) (1) From the equation we can derive that the minimum time needed to locate a resource r in the peer-to-peer network from the node p through its neighbor p, is affected by 3 components: 1) The time the query spends in node p, q p. 2) The transmission delay between p and p. 3) The best estimation time for Q p (p, r). Once we are clear what the Q-values stored at each node stand for, it is easy to see how we can use them for making locally optimal routing decisions. When a node p receives a query q(s, r) looking for resource r, node p will lookup its Q- value table Q p (, r) to select the neighboring node p with the minimum Q p (p, r) value. With this mechanism being used in every node in the network, the query will be answered in a minimal time. B. Updates of Q-value The performance of the routing strategy depends on all the Q-values in the path taken by the query. The closer these Q-values to the actual time needed, the closer the routing strategy reflects the actual optimal time. Therefore, the process of updating the Q-value in a node is very important. Resources Fig. 1. r1 r2 r3 rn Neighbour Q-value p1 p2... pn Q-value table for node p Recall that when node p receives a query q(s, r), it will find a node in the neighbor list such that Q p fulfills the following condition: Q p (p, r) = min Q p(p, r) (2) p N(p) Once p is chosen, p will then forward the query q(s, r) to p. Upon receiving the query, p will first search if it has the requested resource r. If the requested r is not in the shared list of p, it will have to forward the query to its neighbor. For both cases, p will have to send the Q-value back to p. In the first case, since the query can be answered by p, no further routing of the query q(s, r) is needed and the Q-value returned to p is 0. While in the second case, the Q-value, Q p (p, r), returned will be according to equation 2. The Q-value returned by p is essentially its estimation of how long a query will be answered after p has processed the query. The estimation returned is excluded the queuing time at p and the transmission delay, δ, for the query to travel from p to p. Based on the estimated value, node p will calculate the new Q-value for Q p (p, r) with the following equation: Q p (p, r) new = Q p (p, r) old + l(q p (p, r) new + q p + 9 δ Q p (p, r) old ) (3) where l is the learning rate with 0 l 1. When l is set to 1, the equation will become: Q p (p, r) = Q p (p, r) + q p + δ (4) However, since the new Q-value sent back by p is the propagation of estimated values, the Q-value is not necessary accurate. Therefore, in order to reflect the possible error caused by estimation in the learning process, the learning rate should always be set to a value less than 1 {eg. 0.7 has been a suggested learning rate on previous network routing studies}. C. Pruning of Routing Indices Figure 1 depicts the structure of a Routing Index that store Q-values. Each resource r is a record row in the Routing Index. For each resource, there is corresponding Q-value for each neighbor. Since the number of resources in the network determine the number of rows, therefore, the size of the Routing Index is proportional to the resources shared in the network and it can be potentially big. In this work, we study the mechanisms to maintain the size of the Q-value table by proposing the following methods: Stores only n entries that are most recently requested Stores only n entries that are most frequently requested The proposed methods are borrowing the mechanism in the page replacement algorithms, that will be explained in the following subsections.

4 4 1) Global Popularity-Method: The pruning method is according to popularity of resources. This method indexes resources that are most frequently requested in the network. In this method, we assume that we have already known about the popularity of the resources all the time. In the experiment, we do this by generating a popularity list using zipfian distribution. Those resources that are not listed in the popularity list will be ignored. 2) Most Recently Used-Method: This method is based on Least Recently Used (LRU) algorithm. System tries to learn the local popularity of the resources by examining queries that come to the node. Each Routing Index then only stores n resources and their corresponding Q-values which are most recently requested. When a node receives a request on resource r, its Routing Index will be updated by replacing a resource that least recently requested with r and its corresponding Q- values. 3) Most Frequently Used-Method: This method is based on Least Frequently Used (LFU) algorithm. System tries to learn the local popularity of the resources by examining queries that come to the node. Each Routing Index then only stores n resources and their corresponding Q-values which are most frequently requested. When a node receives a request on resource r, its Routing Index will be updated by replacing a resource that least frequently requested with r and its corresponding Q-values. We add a column in the Routing Index to store frequency information. The value of the frequency column will be set to 1 when a resource is put in the first time in the Routing Index or replacing the least frequently used resource and will be incremented with 1 while the resource has resided already in the Routing Index. V. PERFORMANCE ANALYSIS We simulate the peer-to-peer network using our simulator to study the performance of our proposed pruning strategies. The network is a randomly re-wired ring lattice. A ring lattice is a graph with n vertices, each of which is connected to its nearest k neighbors. In our experiments, we use a k value of 4. The rewiring is done by randomly choosing m vertices to connect with each other. In our experiments, we use an m value of 10% of n. This relatively small number compared to n is meant to reflect the small world effect [13]. We randomly assign the d resources to the n nodes according to a uniform distribution. The workload is determined by a Zipfian distribution corresponding to the popularity of the resources. Requests for a resource are generated according to this distribution. Requests originate from a random node chosen uniformly. Figures 2 1 to 5 show the experiment results on static peerto-peer environment without node joins and leaves. We first compare the performance of the global popularity-method, the local popularity-method with LRU and LFU algorithm, as well as for reference, the performance of a method randomly preselecting the resources to be kept in every Routing Index. The workload of the resources is determined by a Zipfian with a 1 The graphs should be viewed in color Fig. 2. Query result on 50% pruning with Zipf θ 0.5 Fig. 3. Query result using LFU with Zipf θ 0.9 Fig. 4. Query result using LFU with Zipf θ 0.5 Fig. 5. Query result using LFU with Zipf θ 0.1 θ coefficient of value 0.5 and prune the Routing Index until 50% of its normal size. The experiment result shows that the LRU- and randommethods do not scale up as they can not route efficiently with 50% and less of the resources in the Routing Indices. This phenomena is not only due to the possible irrelevance of the entries in the Routing Indices but also to their high instability and therefore to the inaccuracy of the content of the Routing Indices under these approaches. Among them, LFU algorithm is the best strategy to approach the performance of the global popularity strategy. Therefore, in the next experiment we only present results for local popularity pruning method using LFU

5 5 Fig. 6. Dynamic leaving & joining every 100 unit of time with Zipf θ 0.5 Fig. 7. Dynamic leaving & joining every 100 unit of time on 40% pruning Fig. 8. Dynamic leaving & joining on 40% pruning with Zipf θ 0.5 algorithm. Figure 3 to 5 show the results of θ equals to 0.9, 0.5, and 0.1 respectively on various pruning factor using LFU algorithm. For each figure, we can see that different pruning factor indeed produces gradual effect on routing time. The experiments also show that different value of θ resulting different pruning factor that makes the routing time still converge. When we set θ equals 0.9, the routing time cannot converge when we prune the Routing Index up to 50%. But when we set θ equals 0.1, the routing time still achieve convergence even we prune the Routing Indices up to 80%. This result confirms that the routing algorithm we employed can be scaled. Figures 6 to 8 show the experiment results on dynamic peer-to-peer environment. To create the dynamic environment, we simulate a node joining or leaving in every t unit of time. First we observe the performance of routing time on different pruning factors with θ equals 0.5. The experiment results show that we still get good result although we are working on dynamic environment. We still can achieve convergence although we prune the Routing Indices until 40%. It can be observed that in some points the routing time is increase, that may be caused by a node leaving. But soon the system tries to update its Routing Indices, so that it can achieve stable state again that brings the routing time back to the minimum time. In the second experiment, we observe again the effect value of θ in dynamic environment. We examine the result by choosing pruning factor 40% and simulating nodes joining or leaving for every 100 unit of time. The result can be seen in figure 7. The figure clearly tells us that we still have gradual effect of the routing time although we are working on dynamic environment. The smaller the value of θ the better the routing time. Figure 8 shows our last experiment to exercise the impact of frequency of node joining and leaving to the routing time. The more node joining or leaving the more dynamic the environment. We exercise the impact by simulating a node joining or leaving every n unit of time, by setting the value of n: 15, 25, 100, 200 and 300. The figure shows that the more dynamic the environment the more difficult the system to converge its routing time. We can observe that the phenomena is caused by the instability of the Routing Indices that may lead to the non optimum path or the resources belonging to the leaving node no longer exist. Therefore, the node needs longer time to search the resource. VI. CONCLUSION AND FUTURE WORKS We have presented a pruning strategy for unstructured peerto-peer systems. The strategy learns the local popularity of the resources to prune the Routing Index in a node. We have shown by empirical analysis that the proposed strategy works well in both static and dynamic environment. This work proves that the viability (effectiveness, efficiency, and scalability) of Routing Indices. We have shown that the necessary adaptiveness can be conferred a reinforcement learning approach. REFERENCES [1] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable Peer-To-Peer lookup service for internet applications. In Proceedings of the 2001 ACM SIGCOMM Conference, [2] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content addressable network. In Proceedings of the 2001 ACM SIGCOMM Conference, [3] P. Druschel and A. Rowstron. Past: A large-scale, persistent peer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HotOS-VIII), May [4] Gnutella home page. In [5] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Lecture Notes in Computer Science, [6] C. Y. Liau, A. N. Hidayanto, and S. Bressan. Adaptive peer-to-peer routing with proximity. In Proceedings of DEXA Conference, [7] S. Bressan, A. N. Hidayanto, C. Y. Liau, and Z. A. Hasibuan. Adaptive double routing indices: Combining effectiveness and efficiency in p2p systems. In Proceedings of DEXA Conference, [8] J. Kubiatowicz et al. Routing indices for peer-to-peer systems. In Proceedings International Conference on Distributed Computing Systems, July [9] R. S. Sutton and A. G. Barto. Reinforcement learning: An introduction. MIT Press, [10] M. Littman and J. Boyan. A distributed reinforcement learning scheme for network routing. In Proceedings of the International Workshop on Applications of Neural Networks to Telecommunications, [11] S. Kumar and R. Mikkulainen. Dual reinforcement q-routing: An online adaptive routing algorithm. In Proceedings of the Artificial Neural Networks in Engineering Conference, [12] S. Kumar and R. Miikkulainen. Confidence based dual reinforcement q-routing: An adaptive online network routing algorithm. [13] A. Oram, editor. Peer-to-Peer : Harnessing the Power of Disruptive Technologies. O Reilly & Associates, 2001.

New Structured P2P Network with Dynamic Load Balancing Scheme

New Structured P2P Network with Dynamic Load Balancing Scheme New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Tornado: A Capability-Aware Peer-to-Peer Storage Network

Tornado: A Capability-Aware Peer-to-Peer Storage Network Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks : Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802

More information

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Chu Yee Liau, Xuan Zhou, Stéphane Bressan, and Kian-Lee Tan Department of Computer Science, National University of Singapore {liaucy,zhouxuan,steph,tankl}@comp.nus.edu.sg

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems

More information

SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *

SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France Maha.Abdallah@lip6.fr Hung Cuong Le

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

Distributed Hash Tables in P2P Systems - A literary survey

Distributed Hash Tables in P2P Systems - A literary survey Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer

More information

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal (aagrawal@acis.ufl.edu) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

GRIDB: A SCALABLE DISTRIBUTED DATABASE SHARING SYSTEM FOR GRID ENVIRONMENTS *

GRIDB: A SCALABLE DISTRIBUTED DATABASE SHARING SYSTEM FOR GRID ENVIRONMENTS * GRIDB: A SCALABLE DISTRIBUTED DATABASE SHARING SYSTEM FOR GRID ENVIRONMENTS * Maha Abdallah Lynda Temal LIP6, Paris 6 University 8, rue du Capitaine Scott 75015 Paris, France [abdallah, temal]@poleia.lip6.fr

More information

Mobile File-Sharing over P2P Networks

Mobile File-Sharing over P2P Networks Category: P2P obile File-Sharing over P2P Networks Lu Yan Åbo Akademi, Finland INTRODUCTION Peer-to-peer (P2P) computing is a networking and distributed computing paradigm which allows the sharing of computing

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

An integrated approach for P2P file sharing on multi-hop wireless networks

An integrated approach for P2P file sharing on multi-hop wireless networks 1 An integrated approach for P2P file sharing on multi-hop wireless networks Bin Tang, Zongheng Zhou, Anand Kashyap and Tzi-cker Chiueh Abstract P2P file sharing protocol and Ad Hoc wireless routing protocol

More information

Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

More information

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,

More information

A methodology for workload characterization of file-sharing peer-to-peer networks

A methodology for workload characterization of file-sharing peer-to-peer networks A methodology for workload characterization of file-sharing peer-to-peer networks Diêgo Nogueira, Leonardo Rocha, Juliano Santos, Paulo Araújo, Virgílio Almeida, Wagner Meira Jr. Department of Computer

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

MASHUPS are an icon of Web 2.0 applications. A

MASHUPS are an icon of Web 2.0 applications. A , 23-25 October, 2013, San Francisco, USA MashChord: A Structured Peer-to-Peer Architecture for Mashups Based on Chord Osama Al-Haj Hassan, Ashraf Odeh, and Anas Abu Taleb Abstract Mashups are key category

More information

Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control

Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control Samuel P.M. Choi, Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology

More information

The Case for a Hybrid P2P Search Infrastructure

The Case for a Hybrid P2P Search Infrastructure The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Chord. A scalable peer-to-peer look-up protocol for internet applications

Chord. A scalable peer-to-peer look-up protocol for internet applications Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction

More information

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

LOOKING UP DATA IN P2P SYSTEMS

LOOKING UP DATA IN P2P SYSTEMS LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed

More information

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network 1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Intelligent Agents Serving Based On The Society Information

Intelligent Agents Serving Based On The Society Information Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Join and Leave in Peer-to-Peer Systems: The DASIS Approach

Join and Leave in Peer-to-Peer Systems: The DASIS Approach Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department

More information

Web Server Software Architectures

Web Server Software Architectures Web Server Software Architectures Author: Daniel A. Menascé Presenter: Noshaba Bakht Web Site performance and scalability 1.workload characteristics. 2.security mechanisms. 3. Web cluster architectures.

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Load Balancing in Distributed Systems: A survey

Load Balancing in Distributed Systems: A survey Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH

LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH S.Hilda Thabitha 1, S.Pallavi 2, P.Jesu Jayarin 3 1 PG Scholar,,Dept of CSE,Jeppiaar Engineering College,Chennai, 2 Research Scholar,Sathyabama University,Chennai-119.

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

Content Delivery Network (CDN) and P2P Model

Content Delivery Network (CDN) and P2P Model A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Analysis of the Traffic on the Gnutella Network

Analysis of the Traffic on the Gnutella Network Analysis of the Traffic on the Gnutella Network Kelsey Anderson University of California, San Diego CSE222 Final Project March 21 Abstract The Gnutella network is an overlay network

More information

P2P Networking - Advantages and Disadvantages of Virtualization

P2P Networking - Advantages and Disadvantages of Virtualization Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction

More information

How To Build A Training System On A Network Of Nodes

How To Build A Training System On A Network Of Nodes BACKUP AND RECOVERY MECHANISM FOR A DISTRIBUTED E-LEARNING SYSTEM Takao KAWAMURA, Syungo KINOSHITA, Shinichi MOTOMURA, and Kazunori SUGAHARA Department of Information and Knowledge Engineering Tottori

More information

CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks

CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks 1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Kang-Won Lee Young-Bae Ko Thyagarajan Nandagopal Abstract The exponential growth of mobile data users and services places

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY [Kavita, 2(4): April, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Histogram Based Live Streaming in Peer to Peer Dynamic Balancing & Clustering System

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Interconnecting Unstructured P2P File Sharing Networks

Interconnecting Unstructured P2P File Sharing Networks Interconnecting Unstructured P2P File Sharing Networks Jaime Lloret Department of Communications, Polytechnic University of Valencia Camino de Vera s/n 46020 Valencia (Spain) Phone: +34 609549043 Fax:

More information

1 Introduction to Internet Content Distribution

1 Introduction to Internet Content Distribution OS 521: Advanced Algorithm Design Hashing / ontent Distribution 02/09/12 Scribe: Shilpa Nadimpalli Professor: Sanjeev Arora 1 Introduction to Internet ontent Distribution 1.1 The Hot-Spot Problem 1 ertain

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)

Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers) Kaushik Sekaran Assistant Professor School of Computing Science & Engineering VIT University,

More information

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks 1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and

More information

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems

Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt anh-tuan.gai@inria.fr Laurent Viennot INRIA Rocquencourt

More information

Self-Chord: a Bio-Inspired Algorithm for Structured P2P Systems

Self-Chord: a Bio-Inspired Algorithm for Structured P2P Systems Self-Chord: a Bio-Inspired Algorithm for Structured P2P Systems Agostino Forestiero, Carlo Mastroianni ICAR-CNR, Rende(CS), Italy {forestiero,mastroianni}@icar.cnr.it Michela Meo Politecnico di Torino,

More information

DEWS2003 2-B-01 Effective load-balancing of peer-to-peer systems

DEWS2003 2-B-01 Effective load-balancing of peer-to-peer systems DEWS23 2-B-1 Effective load-balancing of peer-to-peer systems Anirban Mondal Kazuo Goda Masaru Kitsuregawa Institute of Industrial Science University of Tokyo, 4-6-1, Komaba, Meguro-ku, Tokyo 153-85, Japan

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:

Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts: Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Clustering in Peer-to-Peer File Sharing Workloads

Clustering in Peer-to-Peer File Sharing Workloads Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland

More information

Identity Theft Protection in Structured Overlays

Identity Theft Protection in Structured Overlays Identity Theft Protection in Structured Overlays Lakshmi Ganesh and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara {lakshmi, ravenben}@cs.ucsb.edu Abstract Structured peer-to-peer (P2P) overlays

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate

More information

CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks

CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko Kang-won Lee Thyaga Nandagopal Ajou University IBM T. J. Watson Research Center Bell Labs, Lucent Technologies

More information