To Unify Structured and Unstructured P2P Systems

To Unify Structured and Unstructured P2P Systems

To Unify Structured and Unstructured P2P Systems Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati e-mail: {wanghong, zhuy, yhu}@ececs.uc.edu Abstract track technology that uses special supernodes design, KaZaA becomes popular. Those supernodes always have higher band- Most of current peer-to-peer designs build their own system width and connectivity, and they make an index of all nearby overlays independent of the physical one. Nodes within un- peers’ sharing files. As a result, all queries are routed to those structured systems form a random overlay, on the contrary, supernodes and processed there. Gnutella2 [3] also adopts structured designs normally organize peers into an elegant similar technique to make system more scalable. identifier ring. However, all of those overlays are far from Unstructured P2P systems have advantages on the simple the physical one. protocol, friendly key words searching and powerful ability Noticed that the system overlay is crucial for building a of locating well-duplicated objects, such as music files. How- distributed system, this paper proposes to build system over- ever, they face difficulties on scalability and locating rare ob- lays based on the physical overlay. By making full use of phys- jects. Structured P2P systems, such as Chord [4], CAN [5], ical network characteristics and taking advantages of both Tapestry [6] and Pastry [7], leverage Distributed Hash Ta- structured and unstructured protocols, a network-based peer- bles(DHT) to archive an administration-free, fault-tolerant to-peer system is built in this paper. Not only the system is overly network and guarantee to deliver a message to the des- ¡ £ ¥ § ¡ highly efficient (the stretch is equal to one), but also it can tination within hops. In contrast to the random adapt extremely system churning. The most important is that overlay in unstructured systems, all peers in structured sys- the maintenance overhead is very low, even under highly dy- tems are organized into a clear logical overlay, which is al- namic environment. ways an identifier ring. Also, each object in structured sys- tems has been recorded in its unique place, which is opposite to unstructured ones. By a small entries DHT in each peer, a ¡ £ ¥ § ¡ 1 Introduction query will reach its destination within hops. While elegant from a theoretical perspective, these sys- The last few years have seen a tremendous increase in the in- tems have two obvious mismatches or disadvantages. The terest and research activities of Peer-to-Peer (P2P) systems. first mismatch is between the ideal logical overlay, which is While P2P research covers a wide spectrum of topics, such a linear identifier ring, and the physical overlay, which is a as routing/lookup, security, file systems, load-balancing, etc, power-law network. To a great extent, DHTs ignore the char- one of the most fundamental research topics is how to pro- acteristics of the physical network. As a result, a single "hop" vide efficient lookup services in a large-scale network which may be across two nodes connected via a high speed LAN, is completely distributed and decentralized. or two nodes separated by a low-bandwidth, long-latency link Currently, P2P systems can be classified into two main across half the world. The second one is between node’s ca- categories: unstructured and structured. For unstructured P2P pabilities or resources and their responsibility. Many systems systems, such as Gnutella [1] and KaZaA [2], peers are orga- give every peer in the system equal responsibility, assuming nized arbitrarily. Through simple Ping/Pong mechanism, each all nodes are uniform in resources such as CPU performance peer in Gnutella connects with other peers randomly. An arbi- and network bandwidth. However, this assumption does not trary overlay network is formed by those connections among hold for real systems. For example, half of nodes in a typical peers. Although the protocol is simple, it can keep nodes system are "week-nodes", with low performance, poor relia- highly connected even in event of major disasters. The search bility and intermittent network connection. In addition, nodes protocol uses simple flooding mechanism. When a peer re- in real P2P systems would like to join and leave the system ceives a query message, it simply forwards the query to all very frequently [8, 9]. Granting those nodes the responsibil- neighboring peers. After several turns’ forwarding, one query ity beyond their capabilities significantly impacts the perfor- can reach most of peers in the network. The peers with re- mance and reliability of the system. lated results will answer the query and send the results back. Not only structured systems, unstructured ones suffer However, such mechanism generates a large mount of mes- from the mismatch between the system overlay and the phys- sages per query, which makes the scalability problem when ical one. Previous research [8] showed that 40% nodes in the number of peers grows. Based on the proprietary Fast- 1 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS’05) 1530-2075/05 $ 20.00 IEEE Gnutella were within 10 top ASs, but only 5% communica- designs to build structured and unstructured systems based on tion happened within the same AS. The P2P traffic is becom- our network-based system overlay. In section 6, we evaluate ing the major part of Internet traffic. Being aware of the mis- our approach using simulation. Section 7 concludes the paper. match problem, many works have been done. For unstruc- tured systems, network proximity is used to optimize connec- tions within a peer’s neighbor and neighbors’ neighbors for 2 Related Work Gnutella by Liu, etc. [10]. For structured systems, network and geography proximity are widely used to optimize overlay To exploit physical network information to optimize P2P construction and selection of next hop. All those works im- systems is not a new idea, current works can be classified prove performance significantly, nevertheless, they have limi- into three main categories: proximity routing, topology-based tation because of the restriction of logical overlay. node ID assignment and proximity neighbor selection [11]. The gap between the system overlay and the physical one Proximity routing is employed in Chord [4], CAN [5] and becomes a serious obstacle for the growing of P2P systems. their improvements, such as [12]. With proximity routing, Noticed that the system overlay is crucial for a distributed sys- physical network information is not taken into account when tem, this paper, from a different angle, proposes a new proto- building system overlay. However, heuristic algorithms are col for building P2P systems. Not only it makes full use of used to choose many hops with small latency instead of large physical network characteristics, but also it combines advan- latency ones. Topology-based node ID assignment is em- tages of structured and unstructured protocols and supports ployed in CAN. When a new node joins the overlay, it joins both of them at the same time. Opposite current P2P designs, a node that is close to it in IP distance. Proximity neighbor which focus on their own system overlays, our approach fo- selection is employed in Pastry [7] and Tapestry [6]. Routing cus on physical overlay, and builds system overlay based on table entries are selected according to the proximity metric it. By directly using Internet routing mechanism, the whole among all peers that satisfy the constraints of logical overlay. system is highly efficient, the stretch is equal to one. Also, In Brocade [13] and Expressway [14], a secondary over- it can adapt highly dynamic environment, and has very low lay network of supernodes based on AS-level topology is used maintenance overhead, because most of maintenance can be to improve routing performance. Nodes in the default network done during system common procedures. establish direct connection to a supernode nearby. At the same The contributions of this paper: time, supernodes collect the information of connected nodes and advertise their information in the second overlay. Rout- 1. To our best knowledge, it is our first to propose building ing from node A to B in those systems involves three sections. P2P systems based on Internet physical overlay. While Firstly, A sends the message to local supernode SA. Then this pervious topology-aware designs used network topol- message is routed in the second overlay to the supernode SB ogy information just as the auxiliary approach, our sys- which stores the object for B. Finally, the message reaches tem directly exploits network topology to construct sys- node B. Although their benefits are limited by logical over- tem overlay. Instead of deploying system own routing lay restrictions, and they face the challenge of choosing ap- mechanism, the Internet routing is naturally employed, propriate supernodes and frequently updating information of which highly improves system efficiency. connected nodes for supernodes, those systems produce sig- nificant improvements compared to original designs. 2. A novel and practical approach is proposed to build system overlay closely approximating the physical net- Based on BGP routing table snapshots, Krishnamurthy work. Network topology and positioning techniques are and Wang [15] proposed a promising technique to cluster web perfectly integrated to provide accurate Internet topol- clients, called network-aware clustering. It can effectively ogy. group clients that are topologically close and under common administrative control. By this technique, they further pro- 3. Network characteristics, such as the power low, struc- posed a Cluster-based Architecture for P2P(CAP) [16]. Nodes tured and unstructured protocols are incorporated to- in CAP were clustered into groups by IP prefixes provided by gether. Not only the whole system is highly efficient BGP routing tables. Then those groups acted as the normal in looking up, but also it can adapt extremely system nodes in Gnutella.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us