1 / 37

Peer-to-Peer Services

Peer-to-Peer Services. Lintao Liu 5/26/03. Papers. YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search in Peer-to-Peer Network: Harnessing Latent Semantics AT&T Research Lab & Tel Aviv Univ. Cooperative Peer Groups in NICE

nholly
Télécharger la présentation

Peer-to-Peer Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Peer-to-Peer Services Lintao Liu 5/26/03

  2. Papers • YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology • Stanford University • Associative Search in Peer-to-Peer Network: Harnessing Latent Semantics • AT&T Research Lab & Tel Aviv Univ. • Cooperative Peer Groups in NICE • Univ. of Maryland

  3. YAPPERS: A P2P Lookup Service over Arbitrary Topology • Motivation: • Gnutella-style Systems • work on arbitrary topology, flood for query • Robust but inefficient • Support for partial query, good for popular resources • DHT-based Systems • Efficient lookup but expensive maintenance • By nature, no support for partial query • Solution: Hybrid System • Operate on arbitrary topology • Provide DHT-like search efficiency

  4. Design Goals • Impose no constraints on topology • No underlying structure for the overlay network • Optimize for partial lookups for popular keys • Observation: Many users are satisfied with partial lookup • Contact only nodes that can contribute to the search results • no blind flooding • Minimize the effect of topology changes • Maintenance overhead is independent of system size

  5. Query Model: • <key, value> pair • TotalLookup(N, k): • Return all values associated with k • Query initiates from Node N • PartialLookup(N, k, n): • Return n values associated with k • If total available < n, return all available

  6. Basic Idea: • Keyspace is partitioned into a small number of buckets. Each bucket corresponds to a color. • Each node is assigned a color. • # of buckets = # of colors • Each node sends the <key, value> pairs to the node with the same color as the key within its Immediate Neighborhood. • IN(N): All nodes within h hops from Node N.

  7. One simple example: 2 colors

  8. Immediate Neighborhood • Different node has different IN set. • Two problems: • Consistency: same node should get the same color in different IN set. • Stability: same node is always assigned with the same color even it leaves/joins. • Solution: • Hashing the IP address => color

  9. More… • When node X is inserting <key, value> • Multiple nodes in IN(X) have the same color? • No node in IN(X) has the same color as key k? • Solution: • P1: randomly select one • P2: Backup scheme: Node with next color • Primary color (unique) & Secondary color (zero or more) • Problems coming with this solution: • No longer consistent and stable • The effect is isolated within the Immediate neighborhood

  10. Extended Neighborhood • IN(A): Immediate Neighborhood • F(A): Frontier of Node A • All nodes that are directly connected to IN(A), but not in IN(A) • EN(A): Extended Neighborhood • The union of IN(v) where v is in F(A) • Actually EN(A) includes all nodes within 2h + 1 hops • Each node needs to maintain these three set of nodes for query.

  11. The network state information for node A (h = 2)

  12. Searching with Extended Neighborhood • Node A wants to look up a key k of color C(k), it picks a node B with C(k) in IN(A) • If multiple nodes, randomly pick one • If none, pick the backup node • B, using its EN(B), sends the request to all nodes which are in color C(k). • The other nodes do the same thing as B. • Duplicate Message problem: • Each node caches the unique query identifier.

  13. More on Extended Neighborhood • All <key, value> pairs are stored among IN(X). (h hops from node X) • Why each node needs to keep an EN(X)? • Advantage: • The forwarding node is chosen based on local knowledge • Completeness: a query (C(k)) message can reach all nodes in C(k) without touching any nodes in other colors (Not including backup node)

  14. Maintaining Topology • Edge Deletion: X-Y • Deletion message needs to be propagated to all nodes that have X and Y in their EN set • Necessary Adjustment: • Change IN, F, EN sets • Move <key, value> pairs if X/Y is in IN(A) • Edge Insertion: • Insertion message needs to include the neighbor info • So other nodes can update their IN and EN sets

  15. Maintaining Topology • Node Departure: • a node X with w edges is leaving • Just like w edge deletion • Neighbors of X initiates the propagation • Node Arrival: X joins the network • Ask its new neighbors for their current topology view • Build its own extended neighborhood • Insert w edges.

  16. Problems with basic design • Fringe node: • Those low connectivity node allocates a large number of secondary colors to its high-connectivity neighbors. • Large fan-out: • The forwarding fan-out degree at A is proportional to the size of F(A) • This is desirable for partial lookup, but not good for full lookup

  17. A is overloaded by secondary colors from B, C, D, E

  18. Solutions: • Prune Fringe Nodes: • If the degree of a node is too small, find a proxy node. • Biased Backup Node Assignment: • X assigns a secondary color to y only when a * |IN(x)| > |IN(y)| • Reducing Forward Fan-out: • Basic idea: • try backup node, • try common nodes

  19. Experiment: • H = 2 (1 too small, >2 EN too large) • Topology: Gnutella snapshot • Exp1: Search Efficiency

  20. Distribution of colors per node

  21. Fan-out:

  22. Num of colors: effect on Search

  23. Num of colors: effect on Fan-out

  24. Conclusion and discussion • Each search only disturbs a small fraction of the nodes in the overlay. • No restructure the overlay • Each node has only local knowledge • scalable • Discussion: • Hybrid (unstructured and local DHT) system • …

  25. Associative Search in P2P networks: Harnessing Latent Semantics • Motivation: • Similar with the previous paper • Avoid a blind search on unstructured P2P • Not sensitive to node join/failure • Proposed system: Associative Overlays • Based on unstructured architecture • Improve the efficiency of locating rare items by “orders of magnitude”.

  26. Basic Idea: • Exploit association inherent in human selections • Steer the search process to peers that are more likely to answer a query • Guide Rule: • A set of peers that satisfy some predicate • A search message is only flooding inside one specific Guile Rule.

  27. Guide Rule

  28. More on Guile Rule: • Peers in one Guile Rule • Contain data items that are semantically similar. • E.g. Contain documents on philosophy, songs… • Choose a Guile Rule for query message: • “Networking” aspect (connectivity properties…) • “data mining” aspects: • Tules distill common interests • Maintenance: • Maintain a small list of other peers • Possession Rules • Automatically extracted guide rules from the shared items

  29. Algorithms • RAPIER Algorithm: • Random Possession Rule • If a node is interested in A, B, C, etc, just randomly choose one and perform a blind search amongst that rule • More efficient than blink search • GAS Algorithm: • Greedy Guide Rule • Deciding the order to try different rules • Each node invokes a query in rules that have been more effective on its past queries.

  30. Conclusion and Discussion • It offers orders of magnitude improvement in the scalability of locating infrequent items • Discussion: • the advantage is generated by classifying unstructured peers into some loose so-called “Guile Rules”. • Didn’t understand how they clearly defined these Rules and maintain it. • A lot of mathematics and data mining stuff

  31. Cooperative Peer Groups in NICE • Trust management in P2P environment • Design: • Reputation information is stored in a completely decentralized manner. • Efficient identify non-cooperative nodes • Basic operation: • After a transaction between A and B • A will sign a cookie and send it to B, • B does the same thing • Cookies can be dropped as A/B likes.

  32. Trust Graph • Vertex: Nodes • If A has a cookie issued by B, we draw an edge from B to A. The weight of the edge is the value given by B in the cookie (1/0 in this paper) • A can calculate how much A should believe B • Two different ways proposed

  33. Distributed Trust Reference: • A wants to do a transaction with B: • A needs to present some cookies to B that A is “good” • If A has a cookie assigned by B, A just sends it to B. • If A doesn’t have a cookie from B, so A should collect some related cookies to make B believes that it is “good”.

  34. Distributed Trust Inference: • Detailed Procedures: • A initiates a search for B’s cookies • Recursively search its neighbors • This will generate a trust graph starting from B and ending at A. • A presents all the cookies to B • B will decide whether A is “good” or not • It is A who collects the cookies to • Avoid DoS attack.

  35. Refinements • Efficient searching • Each node caches the cookies of its neighbors • When A searches for B’s cookies, A checks whether its neighbors have. • If no, randomly choose neighbors to forward • This is like flooding: if a neighbor fails, try next • This random walk is limited to predefined steps.

  36. Refinement: • Negative Cookies: • If A has present B enough cookies to make sure A is a “good” peer, B can search for “Negative cookies” of A to make sure. • Search follows the high trust edges out of B • Preference Lists: • Nodes that are highly probably to be “good” • A will try to do transaction with those nodes.

  37. Conclusion and discussion: • Scalable • Resistant to some attack. • But many aspects still don’t look very nice yet. • Discussion??

More Related