Supporting Peer-To-Peer Computing with Flexinet

Supporting Peer-To-Peer Computing with Flexinet

Supporting Peer-to-Peer Computing with FlexiNet Thomas Fuhrmann Institut f¨ur Telematik Universit¨at Karlsruhe (TH), Germany Abstract ules, each AMnet node provides means for resource man- agement, node evaluation, and service relocation. Node Formation of suitable overlay-network topologies evaluation distributively determines on which node(s) a re- that are able to reflect the structure of the underly- quested service will be set up. Service relocation moves an ing network-infrastructure,has rarely been addressed already running service module to another node if either lo- by peer-to-peer applications so far. Often,peer-to-peer cal resources are about to be depleted, or if a service needs protocols restrain to purely random formation of their to follow, e.g., a mobile end-device it is supporting. overlay-network. This leads to a far from optimal per- Since the active nodes seamlessly integrate into standard formance of such peer-to-peer networks and ruthlessly IP networks, FlexiNet’s active nodes need only be deployed wastes network resources. sparsely. A typical FlexiNet improved site1 will contain an In this paper,we describe a simple mechanism that active node as border router connecting the site to its In- uses programmable network technologies to improve ternet Service Provider (ISP). If that connection is realized the topology formation process of unstructured peer-to- redundantly, active nodes should act as border routers for peer networks. Being a network service,our mechanism all of these connections. These active border routers can does not require any modification of existing applica- be supplemented by a number of additional nodes that can tions or computing systems. By that,it assists network be used to scale the performance of the programmable net- operators with improving the performance of their net- work. See also figure 1 for a typical scenario. work and relieves programmers from the burden of de- Uses of FlexiNet are manifold and grow almost daily signing and implementing topology-aware peer-to-peer since the test-bed has gone live recently. Typical FlexiNet protocols. services include Although we use the well-know Gnutella protocol to ¯ Multicast support for non-native IP multicast net- describe the mechanism of our proposed service,it ap- works. Here, an active node detects a second request plies to all kinds of unstructured global peer-to-peer for a stream that is already routed through that node. computing applications. It then does not forward the request upstream to the server, but directly duplicates the stream’s content for Index terms — Overlay-network formation,Topol- the downstream client. This has been demonstrated to ogy shaping,Resource management,Global storage, drastically reduce the bandwidth required for Internet Gnutella,Programmable networks radio applications that use HTTP connections. — The same principle can also be applied to other network services, like anycast and concast. 1 Introduction ¯ Transcoding either for adaptive bandwidth reduction or for extension of interoperability. E.g., one of the FlexiNet is a programmable network infrastructure cur- FlexiNet demo services adapts an MPEG 2 digital TV rently spanning the German research network with active broadcast for a PDA. This is especially useful when nodes located at three major German universities (Berlin, combined with the multicast service described above, Karlsruhe, and Munich) and stubs in a few commercial since here sender-based mechanisms cannot be ap- provider networks. These active nodes run the AMnet node plied. operating software [10, 9] that allows them to capture, pro- 1 cess, and re-inject network-level packets as required by the FlexiNet does not assume that other sites besides the local site are equipped with active nodes. Although, the more sites are FlexiNet- various service modules that populate the active nodes. Be- enhanced, the more services can benefit from the programmable infrastruc- sides the execution environment that hosts the service mod- ture. Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID’03) 0--7695-1919-9/03 $17.00 © 2003 IEEE End-devices Supplementary Active Nodes Conventional Router Local Network Internet Service Provider ... otherISP Local Network Active Nodes as Border Routers Figure 1. Typical setting for the FlexiNet infrastructure: An Internet Service Provider (ISP) employs FlexiNet’s active nodes as border-routers both for its customers’ local networks and for its peerings with other ISPs. ¯ Mobility support — Such services greatly benefit from to make their applications topology aware, by shifting the the combined capability to interact with regular IP traf- task of topology detection from the end-device back into fic (like e.g. a network address translator) while being the network. able to quickly relocate to another active node if re- Considering these advantages, it can be expected that the quired (like e.g. agent-based software components). application of the proposed mechanisms widely improves the performance of peer-to-peer computing in all applica- ¯ Active security mechanisms that detect and battle tion areas. against attacks and intrusion attempts. — These ser- vices also draw from the flexibility to quickly set up services that match a certain requirement, e.g. block 2 Service Module Overview traffic in a distributed denial of service (DDoS) attack close to the originating site. Peer-to-peer (P2P) computing comes in various flavors, extensions, and intensities. Napster, probably one of the Such and other uses of FlexiNet and similar programmable most well-known P2P applications, in fact used a central networking architectures have already been described else- server for locating the data and a genuine P2P approach where [8]. In this paper, we will explain a new use of the only for downloading the data. Other classical Internet FlexiNet infrastructure that can improve peer-to-peer com- applications, like e.g. the Network News Transfer Proto- puting. col (NNTP) [14] already used typical P2P mechanisms for We describe a service module for the FlexiNet infrastruc- what was then called “host-to-host” communication. Simi- ture that equips topology-unaware P2P applications with a lar mechanisms are, e.g. applied in the Gnutella system that mechanism to construct an optimized overlay structure. Be- allows users to locate and retrieve files from the random ing a network service, applying this mechanism does not network formed by (all the) other Gnutella peers. require modification of the P2P application or of the hosts For demonstrating the use of our FlexiNet service we use that run these applications. the well-known Gnutella system [4, 15, 21, 23, 24] since it Although, in the following, we demonstrate the effec- has been comparatively throughly studied. The same mech- tiveness of this service with the Gnutella protocol, the very anism applies similarly to other unstructured P2P networks, same mechanism can be used to improve the topologies of like FreeNet [5] or Morpheus, KaZaA, and other FastTrack- all unstructured P2P networks. This helps network opera- based systems, that have reached wide-spread deployment tors to enhance their networks’ performance and embanks especially among today’s student generation. It can hence the consequences of uncontrolled deployment of resource- be expected that the service presented here can significantly consuming P2P applications. Additionally, this mechanism reduce the network load of academic and commercial net- can also serve P2P application designers as an easy method works. 2 Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID’03) 0--7695-1919-9/03 $17.00 © 2003 IEEE 2.1 Short review of the Gnutella system are so popular with today’s students) prevents the net- work from benefiting from this shared interest. Each Gnutella node is assumed to be equipped with a Several authors have proposed improved protocols that bet- (short) list of other Gnutella nodes, e.g. cached or well- ter match the topologies of overlay-network and underlying known nodes. Upon start-up, a Gnutella node establishes a infrastructure [22, 28, 20, 27]. Unlike the approach pre- connection to one of these nodes, thereby becoming con- sented in this paper, these protocols need to be incorporated nected to the Gnutella overlay-network. In order to re- into the P2P application itself, either directly or via P2P li- trieve a file, a node floods its vicinity of the overlay with braries or middleware, like the JXTA system [11, 26]. As an according request. Here, “vicinity” means that part of many networking examples have demonstrated in the past, the overlay that can be reached within a given number of this is an often unsurmountable barrier. Users tend to get (overlay-)hops. After receiving a positive response from an- locked into popular but inefficient applications and proto- other overlay-node, i.e. a peer, the requesting peer directly cols, even if those protocols are just above the lowest limit connects to the responding peer to retrieve the requested of basic effectiveness. file. A second protocol mechanism, the ping-pong mech- The deployment of a network service, however, can re- anism, similarly floods the node’s vicinity to find more po- move this lock-in: It does not require the users to switch tential peers that it can connect to in order to increase its to another application using an improved protocol, but im- number of links. proves the network performance by transparently correcting some aspects of an inefficient protocol. We will demon- 2.2 Problem statement strate this with our Gnutella-improving FlexiNet service. By this mechanism, Gnutella creates a random graph 2.3 Supporting Peer-to-Peer Computing with with power-law structure which has some advantageous FlexiNet properties [2, 1] but comes also with various draw-backs, The main obstacle for topology-optimized overlay- e.g. the lack of directed search [6], a mismatch of the construction with unstructured P2P applications like overlay-topology with that of the underlying network [20, Gnutella is the lack of a mechanism to detect peers in the 27], and an astonishingly large bandwidth consumption actual network’s vicinity.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us