Beruflich Dokumente
Kultur Dokumente
VTU, BELGAUM
Page 1
PROJECT SYNOPSIS
AIM:
&he main aim of this pro*ect is the Dynamic search (DS) algorithm" which is a generali'ation of flooding and RW. DS takes ad antage of arious conte$ts under which each pre ious search algorithm performs well. (t resem%les flooding for short-term search and RW for long-term search.
Presen T!e"r#:
(n this pro*ect e$isting systems are two different algorithms those are" +. Flooding Algorithm ,. Random Walk (RW) Algorithm
Flooding Algorithm:
-y this method" the #uery source sends its #uery messages to all of its neigh%ors. When a node recei es a #uery message" it first checks if it has the #ueried resource. (f yes" it sends a response %ack to the #uery source to indicate a #uery hit .therwise" it sends the #uery messages to all of its neigh%ors" e$cept for the one the #uery message comes from.
VTU, BELGAUM
Page *
generali'ation of flooding and RW. DS o ercomes the disad antages of flooding and RW and takes ad antage of different conte$ts under which each search algorithm performs well. &he operation of DS resem%les flooding for the short-term search and RW for the long-term search
Page 0
C!a/ er 1 INTRODUCTION
An unstructured 6,6 network is formed when the o erlay links are esta%lished ar%itrarily. Such networks can %e easily constructed as a new peer that wants to *oin the network can copy e$isting links of another node and then form its own links o er time. (n an unstructured 6,6 network" if a peer wants to find a desired piece of data in the network" the #uery has to %e flooded through the network to find as many peers as possi%le that share the data. 6opular content is likely to %e a aila%le at se eral peers and any peer searching for it is likely to find the same thing. -ut if a peer is looking for rare data shared %y only a few other peers" then it is highly unlikely that search will %e successful. Since there is no correlation %etween a peer and the content managed %y it" there is no guarantee that flooding will find a peer that has the desired data. Flooding also causes a high amount of signaling traffic in the network and hence such networks typically ha e ery poor search efficiency. 7any of the popular 6,6 networks are unstructured.
VTU, BELGAUM
Page 1
Page <
Page ;
Jere)# Br"?n7 @$a"8$ang D37 Ken%a(( N#gar%7 =9ightFlood8 7inimi'ing Redundant 7essages and 7a$imi'ing the Scope of 6eer-to-6eer Search>-,*::A) (n the scheme" each peer keeps track of the connecti ityAs of e ery immediate and ne$t indirect neigh%or peers" which can %e ac#uired locally. 9ightFlood identifies the neigh%or with the highest connecti ity and uses the link to that neigh%or to form a su%o erlay within the e$isting 6,6 o erlay. (n 9ightFlood" flooding is di ided into two stages. &he first stage is a standard flooding with a limited num%er of &&9 hops" where a message can spread to a sufficiently large scope with a small num%er of redundant messages. (n the second stage" message propagating is only conducted along the su% o erlay" significantly reducing the num%er of redundant messages. .ur analysis and simulation e$periments show that the 9ightFlood scheme pro ides a low-o erhead %roadcast facility that can %e effecti ely used in 6,6 search.
D$)$ r$"s Ts"3)a+"s7 N$6+ R"3ss"/"3("s7 =Analysis and @omparison of 6,6 Search 7ethods>-,*::A(n this paper popularity and %andwidth consumption attri%uted to current 6eer-to6eer file-sharing applications makes the operation of these distri%uted systems ery important for the (nternet community. <fficient o%*ect disco ery is the first step towards the reali'ation of distri%uted resource-sharing. (n this work" we present a detailed o er iew of recent and e$isting search methods for unstructured 6eer-to-6eer networks.
VTU, BELGAUM
Page A
Page B
N$)a Sars!ar7 P. Os6ar B"#+$n7 =7odels and languages for o erlay networks>-,*::B(n &his paper presents . er79" a high-le el o erlay specification language that is independent of specific frameworks. &he underlying system model" named B)ode CiewsB" a%stracts from low-le el issues such as (D. and message handling and instead mo es ranking nodes and selecting neigh%ors into the heart of the o erlay software de elopment process. &he a%straction decouples maintenance components in o erlay software" considera%ly reduces their need for framework dependent source code and ena%les their generic" configura%le implementation in plugga%le <DS7 frameworks. N$)a Sars!ar7 P. Os6ar B"#+$n7 =6ercolation Search in 6ower 9aw )etworks8 7aking ?nstructured 6eer-&o-6eer )etworks Scala%le>-,*::<&he proposed algorithm is capa%le of finding any content in the network with pro%a%ility one in time .(log))" with a total traffic that pro a%ly scales su%-linearly with the network si'e" ). ?nlike other proposed solutions" there is no need to assume that the network has multiple copies of contentsE the protocol finds all contents relia%ly" e en if e ery node in the network starts with a uni#ue content. &he scaling %eha ior of the si'e of the giant connected component of a random graph with hea y tailed degree distri%utions under %ond percolation is at the heart of our results .
VTU, BELGAUM
Page C
C!a/ er 0
VTU, BELGAUM
Page 1:
VTU, BELGAUM
Page 11
0.1.1 D$sa%&an age RW A(g"r$ !): &he main draw%ack of RW is the long search time. RW only isits one node for each hop" the co erage of RW/01 grows linearly with hop counts" which is slow compared with the e$ponential growth of the co erage of flooding.
generali'ation of flooding and RW. DS o ercomes the disad antages of flooding and RW and takes ad antage of different conte$ts under which each search algorithm performs well. &he operation of DS resem%les flooding for the short-term search and RW for the long-term search
VTU, BELGAUM
Page 1*
VTU, BELGAUM
Page 10
VTU, BELGAUM
Page 11
<.1 P!ase 1. W!en ! F n At this phase" DS acts as flooding. &he num%er of neigh%ors that a #uery source sends the #uery messages to depends on the predefined transmission pro%a%ility p. (f the link degree of this #uery source is d" it would only send the #uery messages to d.p neigh%ors. When p is e#ual to +" DS resem%les flooding. <.* P!ase *. W!en ! G n At this phase" the search strategy switches to RW. <ach node that recei es the #uery message would send the #uery message to one of its neigh%ors if it does not ha e the #ueried resource. Assume that the num%er of nodes isited %y DS at hop h K n is the co erage c(n)" and then the operation of DS at that time can %e regarded as RW with c(n) walkers. !owe er" there are some differences %etween DS and RW when we consider the whole operation.
VTU, BELGAUM
Page 1<
VTU, BELGAUM
Page 1;
;. TECHNOLOGY USED
;.1 NS*: )S or the network simulator (also popularly called ns-," in reference to its current generation) is a discrete e ent network simulator. ns is popularly used in the simulation of routing and multicast protocols" among others" and is hea ily used in ad-hoc networking research. )S, supports an array of popular network protocols" offering simulation results for wired and wireless networks alike. (t can %e also used as limited-functionality network emulator. (t is popular in academia for its e$tensi%ility (due to its open source model) and plentiful online documentation. ns is licensed for use under ersion , of the :)? :eneral 6u%lic 9icense. ;.* Des$gn: )S, was %uilt in @JJ and pro ides a simulation interface through .&cl" an o%*ect-oriented dialect of &cl. &he user descri%es a network topology %y writing .&cl scripts" and then the main )S program simulates that topology with specified parameters. ;.0 H$s "r#: )S %egan de elopment in +L3L as a ariant of the R<A9 network simulator. -y +LL2" ns had gained support from DAR6A" the C()& (Cirtual (nter )etwork &est%ed) pro*ect at 9-9" Hero$ 6AR@" ?@-" and ?S@D(S(./+1. )S, is now de eloped in colla%oration %etween a num%er of different researchers and institutions" including SA7A) (supported %y DAR6A)" @.)S<R (@olla%orati e Simulation for <ducation and Research)(through the )SF)" and (@(R (formerly A@(R(). (t is currently maintained %y olunteers. 9ong-running contri%utions ha e also come from Sun 7icrosystems and the ?@- Daedelus and @arnegie 7ellon 7onarch pro*ects" cited %y the ns homepage for wireless code additions. ;.1 'ea 3res "9 NS*: 6rotocols8 &@6" ?D6" !&&6" Routing algorithms" 7A@ etc &raffic 7odels8 @-R" C-R" We% etc <rror 7odels8 ?niform" %ursty etc 7isc8 Radio propagation" 7o%ility models " <nergy 7odels
VTU, BELGAUM
Page 1A
VTU, BELGAUM
Page 1B
A. SYSTEM DESIGN
Design and &esting is the actual process of producing a solution according to the specification deri ed from the analysis stage.
Peer Req.
Peer Req.
Peer Req.
to
IP Port no of file A
p Re ly
fA
Peer Req. A
Peer Req.
VTU, BELGAUM
Page 1C
VTU, BELGAUM
Page *:
Peer D
Peer C
Peer F
VTU, BELGAUM
Page *1
"ogin
#ile upload
VTU, BELGAUM
Page **
SuperPeer
$onitoring
VTU, BELGAUM
Page *0
Peer "ogin % #ile (pload % &Peer "ogin' &#ile (pload' +ust upload
)uerying % &)uerying'
*ownload % &*ownload'
VTU, BELGAUM
Page *1
)uerying
"ike a client
Page *<
Peer "ogin
#ile upload
)uerying
VTU, BELGAUM
Page *;
$onitoring
$onitoring
$onitoring
VTU, BELGAUM
Page *A
VTU, BELGAUM
Page *B
Peer "ogin
#ile upload
Client
Ser.er
#ile download
Sharing
VTU, BELGAUM
Page *C
$onitoring
Client
Ser.er
VTU, BELGAUM
Page 0:
B.1 Crea $"n "9 Uns r36 3re% Peer- "-Peer Ne ?"r+:
(n this module pro ide the details of unstructured peer-to-peer network. (t means e ery node(peer) acts like as ser er as well as client. (n this network peer has capa%le of send the data at same time recei ing data" centrali'ed administration is not there.
VTU, BELGAUM
Page 01
Fig 4.+ ?nstructured 6eer-to-6eer network (n unstructured peer-to-peer networks" each node does not ha e glo%al information a%out the whole topology and the location of #ueried resources. -ecause of the dynamic property of unstructured 6,6 networks" correctly capturing glo%al %eha ior is also difficult. Search algorithms pro ide the capa%ilities to locate the #ueried resources and to route the message to the target node. &hus" the efficiency of search algorithms is critical to the performance of unstructured 6,6 networks.
Page 0*
B.1.1 P!ase 1. W!en ! F n At this phase" DS acts as flooding. &he num%er of neigh%ors that a #uery source sends the #uery messages to depends on the predefined transmission pro%a%ility p. (f the link degree of this #uery source is d" it would only send the #uery messages to d.p neigh%ors. When p is e#ual to +" DS resem%les flooding. B.1.* P!ase *. W!en ! G n At this phase" the search strategy switches to RW. <ach node that recei es the #uery message would send the #uery message to one of its neigh%ors if it does not ha e the #ueried resource. Assume that the num%er of nodes isited %y DS at hop h K n is the co erage c(n)" and then the operation of DS at that time can %e regarded as RW with c(n) walkers. !owe er" there are some differences %etween DS and RW when we consider the whole operation.
VTU, BELGAUM
Page 00
C.0Tes A//r"a6!es:
Any engineered can %e tested in one of the two ways.
VTU, BELGAUM
Page 01
C.1 S r36 3ra( Tes $ng ,W!$ e B"D Tes $ng(ntroduction White %o$ testing" sometimes called :lass %o$ testing design method that uses the control method of the procedural design to deri e test cases. ?sing white %o$ testing methods" the software engineer can deri e test cases that8 +. :uarantee that all independent paths with in a module ha e %een e$ercised at least once. ,. <$ercise all logical decisions on their true and false sides. I. <$ecute all loops at their %oundaries and with in their alidity. 0. 9ogical errors and incorrect assumptions are in ersely proportional to the pro%a%ility that a program path will %e e$ecuted. 2. .ften %elie e that logical path not likely to e$ecute when" in fact" it may %e e$ecuted on regular %asis. 4. &ypographical errors are random.
VTU, BELGAUM
Page 0<
VTU, BELGAUM
Page 0;
VTU, BELGAUM
Page 0A
VTU, BELGAUM
Page 0B
&he first step includes unit testing where in each module is tested to pro ide his correctness" alidity and also determine any missing operations. <rrors are noted down and corrected immediately. ?nit testing is the import and ma*or part of the pro*ect. So errors are rectified easily in particular module and program clarity is increased. (n this pro*ect entire system is di ided into se eral modules and is de eloped indi idually. So unit testing is conducted to indi idual modules. &he second step includes integration testing. (t need not %e the case" the software whose modules when run indi idually and showing perfect results" will also show perfect results when run as a whole. &he indi idual modules are clipped under this ma*or module and tested again and the results are erified. &he final step in ol es alidation and testing which determines the software functions as the user e$pected. !ere also there may %e some modifications. (n the completion of the pro*ect it is satisfied fully %y the user.
VTU, BELGAUM
Page 0C
VTU, BELGAUM
Page 1:
-y using )S, simulator ,2 nodes are created in the form of unstructured peer to peer network to descri%e flooding algorithm. (n the a%o e figure" %lue colored node is source node" remaining nodes are neigh%or nodes.
VTU, BELGAUM
Page 11
&he a%o e fig shows implementation of the flooding algorithm in the network. &he source node(%lue) send re#uest to all of its neigh%oring nodes until reach the destination node.
VTU, BELGAUM
Page 1*
&he a%o e fig shows that the destination node is indentified and is displayed in red color.
VTU, BELGAUM
Page 10
(n the a%o e fig descri%es the estimated calculations after finding the destination node for instance node 4 is the destination node.
VTU, BELGAUM
Page 11
&he a%o e fig shows that destination node is indentified and is displayed in red color.
VTU, BELGAUM
Page 1<
&he a%o e fig descri%es estimated calculations after finding the destination node for instance node +M is the destination node.
VTU, BELGAUM
Page 1;
&he a%o e figure descri%es implementation of the DS algorithm and this algorithm depends on the network si'e whether to perform flooding or RW algorithm. !ere the network si'e is small" So DS algorithm acts like flooding algorithm.
VTU, BELGAUM
Page 1A
&he a%o e figure shows DS acts like flooding and it reaches the destination node(red)
VTU, BELGAUM
Page 1B
&he a%o e figure descri%es DS acts like RW and it reach the destination node ,5 (%lue). Figure descri%es the estimated calculations after finding the destination node for instance node ,5 is the destination node.
VTU, BELGAUM
Page 1C
Sear6! $)e
N3)5er "9 n"%es &he a%o e graph descri%es the performance comparison of the e$isting system and dynamic search algorithm. (n the a%o e $-a$es represents num%er of nodes and y-a$es represent the search time. Red color shows the flooding" %lue color shows random and green color shows dynamic search algorithm.
VTU, BELGAUM
Page <:
11.* Sear6! T$)e ,ST-: &o represent the capa%ility of one search algorithm to find the #ueried resource in time with a gi en pro%a%ility" define the search time as the time it takes to guarantee the #uery success with success rate re#uirement re#uest. 11.0 S366ess Ra e ,SR-: &he success rate (SR) is the pro%a%ility that a #uery is successful" i.e." there is at least one #uery hit. Assume that the #ueried resources are uniformly distri%uted in the network with a replication ratio R. SR can %e calculated as SR K +-(+-@)" @--O is a co erage
VTU, BELGAUM
Page <1
11. 1 Res3( s
Al$orith%
floodin$
Al$orith%
R ndo% w lk
Al$orith%
R ndo% w lk
VTU, BELGAUM
Page <*
VTU, BELGAUM
Page <0
1*. LIMITATIONS
)owadays DSA algorithm had %een used in unstructured p,p network and itAs %een one of the most successful search algorithms. Some knowledge-%ased search algorithms" including A6S" %iased RW" R(" local indices" and intelligent search" are applica%le to com%ine with our DS algorithm and any training or caching operations are %enefit from our DS algorithm as well. &he generic scheme to incorporate these knowledge-%ased search algorithms with our DS algorithm. @onstruct the pro%a%ilistic function %ased on the information learned from the past e$periences" with respect to each search target" search time" and local topology information. &hus" a node has more information to intelligently decide how many #uery messages to send and to which peers these messages should %e forwarded.
VTU, BELGAUM
Page <1
10. APPLICATIONS
)owadays DSA algorithm had %een used in unstructured p,p network and itAs %een one of the most successful search algorithms. Some knowledge-%ased search algorithms" including A6S" %iased RW" R(" local indices" and intelligent search" are applica%le to com%ine with our DS algorithm and any training or caching operations are %enefit from our DS algorithm as well. &he generic scheme to incorporate these knowledge-%ased search algorithms with our DS algorithm. @onstruct the pro%a%ilistic function %ased on the information learned from the past e$periences" with respect to each search target" search time" and local topology information. &hus" a node has more information to intelligently decide how many #uery messages to send and to which peers these messages should %e forwarded.
VTU, BELGAUM
Page <<
11. C"n6(3s$"n
&his pro*ect implemented the DS algorithm" which is a generali'ation of the flooding and RW. DS o ercomes the disad antages of flooding and RW" and takes ad antage of arious conte$ts under which each search algorithm performs well. (t resem%les flooding for the short-term search and RW for the long-term search. Analy'e the performance of DS %ased on some metrics including the success rate" search time" num%er of #uery hits" num%er of #uery messages. )umerical results show that proper setting of the parameters of DS can o%tain short search time and pro ide a good tradeoff %etween the search time and cost.
VTU, BELGAUM
Page <;
REFERENCES
/+1 D. Stut'%ach" R. Re*aie" ). Duffield" S. Sen" and W. Willinger" =Sampling &echni#ues for 9arge" Dynamic :raphs"> 6roc. )inth (<<< :lo%al (nternet Symp. (:lo%al (nternet A54)" Apr. ,554 /,1 D. 7ilo*icic" C. Falogeraki" R. 9ukose" F. )agara*a" P. 6ruyne" -. Richard" S. Rollins" and Q. Hu" =6eer-to-6eer @omputing"> &echnical Report !69-,55,-2M" !6" ,55,. /I1. -. Gang and !. :arcia-7olina" =(mpro ing Search in 6eer-to-6eer )etworks"> 6roc. ,,nd (ntAl @onf. Distri%uted @omputing Systems ((@D@S A5,)" pp. 2-+0" Puly ,55,. /01 /L1 @. :kantsidis" 7. 7ihail" and A. Sa%eri" =Random Walks in 6eer-to-6eer )etworks"> 6roc. (<<< ()F.@.7 A50" pp. +,5-+I5" ,550. /21 @. :kantsidis" 7. 7ihail" and A. Sa%eri" =!y%rid Search Schemes for ?nstructured 6eer-to-6eer )etworks"> 6roc. (<<< ()F.@.7 A52" pp. +2,4-+2IM" ,552. /41 R. 9 " 6. @ao" <. @ohen" F. 9i" and S. Shenker" =Search and Replication in ?nstructured 6eer-to-6eer )etworks"> 6roc. +4th Ann. (ntAl @onf. Supercomputing ((@S A5,)" pp. 30-L2" Pune ,55,. /M1 Q. :e" D.R. Figueiredo" S. Paiswal" P. Furose" and D. &owsley" =7odeling 6eer-6eer File Sharing Systems"> 6roc. (<<< ()F.@.7 A5I" pp. ,+33-,+L3" ,55I. /31 S. Saroiu" 6.F. :ummadi" and S.D. :ri%%le" =A 7easurement Study of 6eer-to-6eer File Sharing Systems>. 77@)" Pan. ,55,. /L1 S. Piang" 9. :uo" H. Qhang" and !. Wang" =9ightFlood8 7inimi'ing Redundant 7essages and 7a$imi'ing Scope of 6eer-to-6eer Search"> (<<< &rans. 6arallel and Distri%uted Systems" ol. +L" no. 2" pp. 45+-4+0" 7ay ,553. /+51 D. &soumakos and ). Roussopoulos" =Adapti e 6ro%a%ilistic Search for 6eer-to6eer )etworks"> 6roc. &hird (ntAl @onf. 6eer-to- 6eer @omputing (6,6 A5I)" pp. +5,-+5L" Sept. ,55I.
VTU, BELGAUM
Page <A
VTU, BELGAUM
Page <B