<<

Topology Discovery ?

Demetris Zeinalipour-Yazti Theodoros Folias Dept. of Computer Science University of California Riverside, CA 92507, U.S.A csyiazti,folias @cs.ucr.edu { }

Abstract. Peer-to-Peer (P2P) file-sharing systems such as Gnutella, and Freenet have recently attracted a lot of interest from the internet community because they realized a distributed infrastructure for sharing files. Such systems have shifted the Web’s Client-Server model paradigm into a Client-Client model. The tremendous success of such systems has proven that purely distributed search systems are feasible and that they may change the way we interact on the Internet. Although P2P systems uncover many new features such as robustness, scalability and high fault tolerance, they also introduce a lot of redundancy, in terms of messages, since most P2P protocols use message flooding. Although most research concentrates on optimizing the communication and data model of such systems, inadequate work has been done in the area of modeling them. Most approaches tend to use as their basis simulation models which can lead to wrong observations and solutions. In this project we want to investigate the behavior of the Gnutella fully distributed P2P system, by attaching to the network a large set of peers which will gather and analyze messages that are routed through them. We aim to use this data to create an accurate network model which will provide us an insight into the true nature of the system and which allows the generation of realistic topologies for simulation purposes. Such modeling would also facilitate the design of new more efficient communication algorithms between peers.

1 Motivation

In this project we want to investigate the behavior of the Gnutella fully distributed P2P system, by attaching to the network a large set of peers which will gather and analyze messages that are routed through them. To our knowledge, Jovanovic et al. study, of Modeling Large-scale Peer-to-Peer Networks, is the only comprehensive work done in this area. We believe that their experimental results are not representative of the today’s picture of the Gnutella Network since they were performed in 2000 when the Gnutella Network was relatively small. In an experiment conducted in December 2000 [3], they present five snapshots of the Gnutella Network, each of which includes averagely 1000 nodes and 3000 edges. This is obvisously not valid anymore since the Gnutella community has grown at extremely high rates since then. Clip2 [11] shows that the typical number of peers found in the Gnutella [12] network during a weekday is 43, 546 peers sharing 1, 843, 549 files. Recently another huge network of peers, namely Morpheus [9], which was previously operating over the [13] protocol, joined the Gnutella Network. Cnet.com [16] has logged 78, 629, 070 downloads of the popular Morpheus Gnutella beta client in a period of 12 days making it the most popular download on the internet. Moreover to that more sophisticated Gnutella peers, such as Limewire [10], were developed in the meanwhile and which might have contributed to the fact that the dynamics of the Network have changed. We need to mention that most research in P2P systems concentrates on optimizing the communication and data model of P2P systems [4][5][6], without taking into regards the real model of such systems. Most

? Project Proposal for ”Advanced Topics in Networks”, with Michalis Faloutsos at the University of California - Riverside, Department of Computer Science, April 2002. http://www.cs.ucr.edu/~csyiazti/cs204.html , Notice: The title might become more specific depending on the progress of the project The Gnutella v0.4 Protocol

GNUTELLA Host-Cache Server e.g public..net:6346

p1 1 p2

Servent Joining Network Servent on Network GNUTELLA CONNECT/0.4\n\n 212.23.34.233:6368 2 61.23.434.34:6346 GNUTELLA OK \n\n

3 PING PONG Shared Files Shared Files 4 QUERY QUERYHIT Shared Files Index Shared Files Index 5 PUSH HTTP CLIENT HTTP SERVER Gnutella Protocol Messages

GET /filename.mp3 HTTP/1.1 6

Fig. 1. Gnutella v0.4 Protocol. approaches tend to use as their basis simulation models which can lead to wrong observations and solutions. There are many reasons for obtaining an accurate network model. Some of the main reasons, which are summarized in [2], are the following: 1. Provide an insight into the nature of the underlying system even if it was possible to catalog all the vertices and edges of the network

2. Enables analytical analysis of algorithms that are designed to perform on such topologies.

3. Allows generation of realistic topologies for simulation purposes that accurately capture important structural characteristics present in the original networks.

4. Facilitates design of new scalable algorithms that can be design to take advantage of particular struc- tural properties.

5. Allows prediction of future trends, thereby allowing developers to address potential problems in ad- vance.

2 The Gnutella Protocol at a Glance

Gnutella’s distributed search protocol [14] allows a set of peers, servents or clients, to perform filename searches over other clients without the need of an intermediate Index Server. The Gnutella network topology is a pure Ad-Hoc topology where Clients may join or leave the network at any time without affecting the rest topology in any sense. The Protocol hence, is designed in a highly fault-tolerant fashion with a quite big overhead [4] of synchronization messages traveling through its network. All searches are performed over the Gnutella network while all file downloads are done offline. In this way every servent that needs to serve a file launches a mini HTTP 1.1 web server and communicates with the interested servents with HTTP commands. The core of the protocol consists of a set of descriptors which are used for communication between servents and also sets rules for the inter-servents descriptors exchange. These descriptors are Ping, Pong, Query, QueryHit and Push. Ping messages are sent by a servent that needs to discover hosts that are currently active on the network. Pong messages on the other hand are responses to Ping requests every time a host wants to come in communication with the peer that requests to join the network (Figure 1, step 3). Although the protocol doesn’t set any bound on the amount of incoming or outcoming connections from a particular host, most Gnutella clients come with a default value for these parameters, usually 10, but which are adjustable by the user. A client joining the Gnutella network for the first time may of course not have any clue regarding the current topology or his neighboring peers making the connection to the network impossible. For this reason most client vendors have setup Host-Caches Servers which serve clients with IP addresses of servents currently connected to the network (step 1). Another mechanism which is widely deployed, but is not part of the protocol, is the use of local caches of IP addresses from previous connections. In this way a servent doesn’t need to connect to an IP acquisition server (i.e. a host-cache) but can rather try to establish a connection with one of its past peers. Right after a peer has obtained a valid IP address and socket port of another servent it may per- form several queries by sending Query descriptors and receive asynchronously results in QueryHit descrip- tors (step 4). Step 6 shows how a servent p1 may download a file from another servent p2. This procedure is done offline with the HTTP protocol. If the servent p2 is firewalled, then p1 may request from p2, with a Push descriptor (step 5), to ”push” the file.

3 Related Work.

Jovanovic et al. study [2], of Modeling Large-scale Peer-to-Peer Networks, is to our knowledge the only comprehensive work done in the area of modeling Peer-to-Peer systems. In their work they discovered that the Gnutella Network obeys all four of the power-laws described in Faloutsos et al. work. [1]. They also present interesting visualizations of their gathered data. The main disadvantages that we have identified is that their experiments were performed on a small set of peers (1000), which is not representative of the today’s picture of the network. Moreover to that their Implementation is in some sense static since it starts from a pre-specified seed file of peers and relies on the fact that it will discover new nodes on runtime. The Anthill Project [8] developed at the University of Bologna uses Jtella [7] Java API as a basis for buliding a fully customizable API for the Gnutella network, which will allow them to monitor efficiently the Gnutella Network. The aim of their project is to characterize the Gnutella Network based on the monitoring of messages exchanged through the Gnutella nodes. The use again, as in [2], a Gnutella node that logs the messages it receives and possibly interact with the other nodes to discover the network structure. They are interested in obtaining : 1. Information about the queries performed by users and their distribution. More specifically they aim to find popular queries or keywords that may be exploited to implement intelligent caching algorithms.

2. Information about the files stored in the Gnutella network, which might be obtained by logging the Gnutella QUERYHIT messages.

3. Information about the shape of the network, which might be obtained by actively probing Gnutella PING and PONG messages. They also intend to take advantage of the Gnutella PUSH messages in order to partially investigate which files are downloaded by users. All this information will be collected in order to obtain behavioral patterns which will be used in the simulations performed in the Anthill network. GnutellaMeter [15] monitors the traffic patterns of the Gnutella network by attaching itself as a passive observer to well-positioned peers in the network and by analyzing search queries and identification messages passing through the Gnutella network. GnutellaMeter presents the top 300 queries performed on the Gnutella Network. Their proprietary infrastructure makes it difficult to say many thing about how results are gathered. It is also not possible to say whether their results are real-time or not. 4 How Will We Approach the Problem?.

We will start out by doing a literature survey. This will help us to identify new problems or issues that were not addressed in previous work. We will use the Jtella [7] Java API as a basis for building a highly distributed ”Fake Network” that will be attached to the current Gnutella Network. Our Network won’t disrupt the regular operation of the network in any sense but it will simply gather passively data. We have already implemented some preliminary experiments that have shown us that our expected task is feasible. Our proposed solutions of how to model efficiently highly dynamic and distributed networks will be stated after we finish with the literature survey.

References

1. Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power-law relationships of the internet topol- ogy. In SIGCOMM, pages 251-262, 1999. 2. M. Jovanovic, F.S. Annexstein, and K.A. Berman. Modeling Peer-to-Peer Network Topologies through ”Small- World” Models and Power Laws. In TELFOR, Belgrade, Yugoslavia, November, 2001 3. F.S. Annexstein, K.A. Berman, and M. Jovanovic. Latency Effects on Reachability in Large-scale Peer-to-Peer Networks. In ACM Symposium on Parallel Algorithms and Architectures, Crete Island, Greece, 2001. 4. Beverly Yang and Hector Garcia-Molina, ”Comparing hybrid peer-to-peer systems”, Proc. 27th Int. Conf. on VLDB, Rome, 2001. 5. H. Stoica, I. Morris, R. Karger, D. Frans Kaashoek, M. Balakrishnan, ”Chord: A scalable peer-to-peer lookup service for Internet applications”, SIGCOMM 2001. 6. S. Gribble, A. Halevy, Z. Ives, M. Rodrig, D. Suciu. ”What Can Databases do for Peer-to-Peer? WebDB Work- shop on Databases and the Web, June 2001. 7. Ken Mccrary, ”The JTella Java API for the Gnutella network”, October 2000, http://www.kenmccrary.com/jtella/. 8. The Anthill Project, Gnutella Monitoring, Department of Computer Science, University of Bologna. 9. Morpheus. , MusicCity.com, http://www.musiccity.com/. 10. LimeWire. , LimeWire.com, http://www.limewire.com/. 11. Clip2. , Clip2.com, http://www.clip2.com/. 12. Napster, Napster.com, http://www.napster.com/. 13. Kazaa, Kazaa.com, http://www.kazaa.com/. 14. Gnutelliums, Gnutella, http://www.gnutelliums.com/. 15. The GnutellaMeter, http://www.gnutellameter.com/gnutella-hosts.html. 16. Cnet.com, http://www.cnet.com/.