提高P2P覆盖搜索效率的分布式算法(IJCNIS-V4-N3-1)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.ComputerNetworkandInformationSecurity,2012,3,1-7PublishedOnlineApril2012inMECS()DOI:10.5815/ijcnis.2012.03.01DistributedAlgorithmsforImprovingSearchEfficiencyinP2POverlaysChittaranjanHota1,VikramNunia1,AnttiYlä-Jääski21Dept.ofComputerScienceandInformationSystems,BirlaInstituteofTechnologyandScience-PilaniHyderabadCampus,Hyderabad,AP,India,5000782DepartmentofComputerScience&Engineering,AaltoUniversity,Helsinki,Finlandhota@bits-hyderabad.ac.in,vikram.nunia@gmail.com,Antti.Yla-Jaaski@tkk.fiAbstract—Peer-to-peer(P2P)overlayisadistributedapplicationarchitectureinwhichpeerssharetheirresources.Peersareequallyprivileged,equipotentparticipantsintheapplication.SeveralalgorithmsforenhancingP2Pfilesearchinghavebeenproposedintheliterature.Inthispaper,wehaveproposedauniqueapproachofreducingtheP2Psearchcomplexityandimprovingsearchefficiencybyusingdistributedalgorithms.Inourapproachapeermountsotherpopularpeer’sfilesandalsoreplicatesotherpopularfilesorcriticalfilesidentifiedusingathresholdvalue.Onceafileismounted,fileaccessrequestscanbeservicedbytransparentlyretrievingthefileandsendingittotherequestingpeer.Replicationusedinthisworkimprovesthefileretrievaltimebyallowingparalleltransfer.Wehaveshowntheperformanceanalysisofourproposedapproachwhichshowsimprovementinthesearchefficiency.IndexTerms—Algorithm;FileSharing;Replication;Mounting;BootstrapPeer.I.INTRODUCTIONThepeertopeer(P2P)paradigmhadstartedbecomingpopularinthemiddleof2000amongstinternetmusiclovers.Sincethen,duetoitsinherentpositivecharacteristics,theterm‘P2P’hasbecomeverypopularamongstinternetusers,researchersandindustries.AsystemistobeconsideredP2Piftheelementsthatformthesystemsharetheirresourcesinordertoprovidethedesignatedservices.Theelementsinthesystemprovidebothclientandserverservicesi.e.,providingservicestootherelementsandrequestingservicesfromotherelements.Anoverlaynetworkisalogicalnetworkattheapplicationlayerprovidingconnectivity,routingandmessagingamongsttheaddressableendpoints.Theyhavetheirowntopologydifferentfromunderlyingphysicalnetwork.TheyhavetheirwayofroutingmessageswiththehelpoftheInternet.Theyhavetheirownwayofaddressingtheendpoints.Overlaynetworksarefrequentlyusedasasubstratefordeployingnewnetworkservices,orforprovidingaroutingtopologynotavailablefromtheunderlyingphysicalnetworkasshowninFig.1.P2Poverlaynetworksarecategorizedasunstructuredandstructured.AnunstructuredP2Pnetworkiscomposedofpeersjoiningthenetworkwithsomelooserules,withoutanypriorknowledgeofthetopology.Gnutella[1]andKazaa[2]areexamplesofunstructuredP2Poverlaynetworks.InstructuredP2Poverlaynetworks,networktopologyistightlycontrolledandcontentisplacednotatrandompeersbutatspecifiedlocationsthatwillmakesubsequentqueriesmoreefficient.MostofthestructuredP2PoverlaysareDistributedHashTable(DHT)based.ContentAddressableNetwork(CAN),Chord,andPastryaresomeofthewellknownexamplesofstructuredP2Poverlaynetworks.Inthiswork,wehavedevelopedauniqueapproachofreducingtheP2Psearchcomplexityandimprovingsearchefficiencybyusingdistributedalgorithmsmountingandreplication.Apeerwhichservesmorenumberofpeers(wecallitasapopularpeer)mountsheavilyusedfilesfromotherpeers.Thispopularpeerwhencontactedbyotherpeerstransparentlyretrievesthefilesandgivesthosetotherequestingpeer.Figure1.AnExampleP2POverlayNetworkThereplicationalgorithmdevelopedreplicatescriticalfilesatmultiplepeers.Acriticalfileisafilethatisaccessedmorethanathresholdlimit,whichistunable.ThepeersthatareselectedaslocationforstoringreplicasarejudiciouslydecidedonvariousfactorslikenumberofCPU,Storagecapacity,andPeerconnectiondegreeatthatpeer.Copyright©2012MECSI.J.ComputerNetworkandInformationSecurity,2012,3,1-72DistributedAlgorithmsforImprovingSearchEfficiencyinP2POverlaysTheremainderofthepaperisorganizedasfollows.SectionIIreviewstherelatedresearch.SectionIIIdiscussesmodelsandassumptions.SectionIVpresentsourproposedimplementation.InSectionV,wedescribeourdistributedalgorithms.SectionVIgivesdetailsaboutthesimulationrun.Finally,SectionVIIconcludesthepaperandpresentsfutureresearchdirections.II.RELATEDWORKSearchinanunstructuredpeer-to-peerfilesharingsystemisdependentonmanyfactorscenteredonoverlaytopology,dataplacementandrouting[3].Agoodsearchmechanismisonewhichallowsuserstoeffectivelylocatedesireddatainaresource-efficientmanner[3].Inunstructuredoverlays,thereareseveralchallengesliketheirlargesize,transitivepopulationofnodes,heterogeneity,userautonomyetc.Therearenumberofsearchalgorithmsproposedtomeetthesechallenges.Thefirstfilesharingnetwork[4]maintainedacentralizedindexofallthefiles.Searchiscarriedoutbythecentralserveritselfwithoutinvolvingothernodesinthenetwork.Butcentralservershavethesomelimitationslikesinglepointoffailure,scalability,etc.WithlitigationswithNapster,Gnutella[1]becamepopular.GnutellausesafullydecentralizedsearchmechanismwhichisknownasFloodingor,Breadth-first-search[5].Lvetal.[6]notesseverallimitationsoffloodinglikeheterogeneityissues,selectingappropriateTTL,handlingofduplicatequeries.YangandGracia-Molina[5]proposedfloodingpoli

1 / 7
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功