9 research outputs found

    The state of peer-to-peer network simulators

    Get PDF
    Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate and extend existing work. We look at the landscape of simulators for research in peer-to-peer (P2P) networks by conducting a survey of a combined total of over 280 papers from before and after 2007 (the year of the last survey in this area), and comment on the large quantity of research using bespoke, closed-source simulators. We propose a set of criteria that P2P simulators should meet, and poll the P2P research community for their agreement. We aim to drive the community towards performing their experiments on simulators that allow for others to validate their results

    Capacity Proportional Unstructured Peer-to-Peer Networks

    Get PDF
    Existing methods to utilize capacity-heterogeneity in a P2P system either rely on constructing special overlays with capacity-proportional node degree or use topology adaptation to match a node's capacity with that of its neighbors. In existing P2P networks, which are often characterized by diverse node capacities and high churn, these methods may require large node degree or continuous topology adaptation, potentially making them infeasible due to their high overhead. In this thesis, we propose an unstructured P2P system that attempts to address these issues. We first prove that the overall throughput of search queries in a heterogeneous network is maximized if and only if traffic load through each node is proportional to its capacity. Our proposed system achieves this traffic distribution by biasing search walks using the Metropolis-Hastings algorithm, without requiring any special underlying topology. We then define two saturation metrics for measuring the performance of overlay networks: one for quantifying their ability to support random walks and the second for measuring their potential to handle the overhead caused by churn. Using simulations, we finally compare our proposed method with Gia, an existing system which uses topology adaptation, and find that the former performs better under all studied conditions, both saturation metrics, and such end-to-end parameters as query success rate, latency, and query-hits for various file replication schemes

    Enabling technologies for decentralized interpersonal communication

    Get PDF
    In the recent years the Internet users have witnessed the emergence of Peer-to-Peer (P2P) technologies and applications. One class of P2P applications is comprised of applications that are targeted for interpersonal communication. The communication applications that utilize P2P technologies are referred to as decentralized interpersonal communication applications. Such applications are decentralized in a sense that they do not require assistance from centralized servers for setting up multimedia sessions between users. The invention of Distributed Hash Table (DHT) algorithms has been an important, but not an inclusive enabler for decentralized interpersonal communication. Even though the DHTs provide a basic foundation for decentralization, there are still a number of challenges without viable technological solutions. The main contribution of this thesis is to propose technological solutions to a subset of the existing challenges. In addition, this thesis also presents the preliminary work for the technological solutions. There are two parts in the preliminary work. In the first part, a set of DHT algorithms are evaluated from the viewpoint of decentralized interpersonal communication, and the second part gives a coherent presentation of the challenges that a decentralized interpersonal communication application is going to encounter in mobile networks. The technological solution proposals contain two architectures and two algorithms. The first architecture enables an interconnection between a decentralized and a centralized communication network, and the second architecture enables the decentralization of a set of legacy applications. The first algorithm is a load balancing algorithm that enables good scalability, and the second algorithm is a search algorithm that enables arbitrary searches. The algorithms can be used, for example, in DHT-based networks. Even though this thesis has focused on the decentralized interpersonal communication, some of the proposed technological solutions also have general applicability outside the scope of decentralized interpersonal communication

    Gossip-based search selection in hybrid peer-to-peer networks

    No full text
    Abstract: We present GAB, a search algorithm for hybrid P2P networks, that is, networks that search using both flooding and a DHT. GAB uses a gossipstyle algorithm to collect global statistics about document popularity to allow each peer to make intelligent decisions about which search style to use for a given query. Moreover, GAB automatically adapts to changes in the operating environment. Synthetic and trace-driven simulations show that compared to a simple hybrid approach, GAB reduces the response time by 25-50 % and the average query bandwidth cost by 45%, with no loss in recall. GAB scales well, with only a 7 % degradation in performance despite a tripling in system size. I

    Resource discovery for distributed computing systems: A comprehensive survey

    Get PDF
    Large-scale distributed computing environments provide a vast amount of heterogeneous computing resources from different sources for resource sharing and distributed computing. Discovering appropriate resources in such environments is a challenge which involves several different subjects. In this paper, we provide an investigation on the current state of resource discovery protocols, mechanisms, and platforms for large-scale distributed environments, focusing on the design aspects. We classify all related aspects, general steps, and requirements to construct a novel resource discovery solution in three categories consisting of structures, methods, and issues. Accordingly, we review the literature, analyzing various aspects for each category

    Enhanced Resource Discovery Mechanisms for Unstructured Peer-to-Peer Network Environments

    Get PDF
    This study explores novel methods for resource discovery in unstructured peerto-peer (P2P) networks. The objective of this study is to develop a lightweight resource discovery mechanism suitable to be used in unstructured P2P networks. Resource discovery techniques are examined and implemented in a simulator with high scalability in order to imitate real-life P2P environments. Simulated topology generator models are reviewed and compared, the most suitable topology generator model is then chosen to test the novel resource discovery techniques. Resource discovery techniques in unstructured P2P networks usually rely on forwarding as many query messages as possible onto the network. Even though this approach was able to return many resources, the flooding of the network with query messages have an adverse effect on the network. Flooding the network has undesirable consequences such as degenerative performance of the network, waste of network resources, and network downtime. This study has developed alpha multipliers, a method of controlling query message forwarding to deal with the flooding effect of most resource discovery techniques in unstructured P2P networks. The combination of alpha multipliers and breadth-first search (BFS), ↵-BFS, was able to avoid the flooding effect that usually occurs with BFS. The ↵-BFS technique also increases the combined query efficiency compared to the original BFS. Aside from improving a uninformed search technique such as the BFS, this study also examines the network communication cost of several informed resource discovery techniques. Several issues that arise in informed resource discovery techniques, such as false positive errors, and high network communication costs for queries to update search results are discussed. This detailed analysis forms the basis of a lightweight resource discovery mechanism (LBRDM) that reduces the network communication cost by reducing the number of backward updates inside the network when utilising the blackboard resource discovery mechanism (BRDM). Simulations of BRDM and LBRDM show that the lightweight version can also return an almost identical combined query efficiency than the BRDM. The solution to control query message forwarding in ↵-BFS, and the removal of unnecessary exchange of information in LBRDM open a new perspective on simplifying resource discovery techniques. These approaches can be implemented on other techniques to improve the performance of resource discovery
    corecore