ITA: Innocuous Topology Awareness for Unstructured P2P Networks

被引:5
|
作者
Papadakis, Harris [1 ]
Fragopoulou, Paraskevi [2 ]
Markatos, Evangelos P. [2 ]
Roussopoulos, Mema [3 ]
机构
[1] Technol Educ Inst Crete, Dept Appl Informat, GR-71004 Estavromenos Iraklio Cre, Greece
[2] Insitute Res & Technol, GR-70013 Iraklion, Crete, Greece
[3] Univ Athens, GR-15784 Athens, Greece
关键词
Peer-to-peer; unstructured overlay network; topology awareness; self-(star) properties; IP network layer; communication latency;
D O I
10.1109/TPDS.2012.137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most appealing characteristics of unstructured P2P overlays is their enhanced self-(star) properties, which results from their loose, random structure. In addition, most of the algorithms which make searching in unstructured P2P systems scalable, such as dynamic querying and 1-hop replication, rely on the random nature of the overlay to function efficiently. The underlying communications network (i.e., the Internet), however, is not as randomly constructed. This leads to a mismatch between the distance of two peers on the overlay and the hosts they reside on at the IP layer, which in turn leads to its misuse. The crux of the problem arises from the fact that any effort to provide a better match between the overlay and the IP layer will inevitably lead to a reduction in the random structure of the P2P overlay, with many adverse results. With this in mind, we propose ITA, an algorithm which creates a random overlay of randomly connected neighborhoods providing topology awareness to P2P systems, while at the same time has no negative effect on the self-(star) properties or the operation of the other P2P algorithms. Using extensive simulations, both at the IP router level and autonomous system level, we show that ITA reduces communication latencies by as much as 50 percent. Furthermore, it not only reduces by 20 percent the number of IP network messages which is critical for ISPs carrying the burden of transporting P2P traffic, but also distributes the traffic load more evenly on the routers of the IP network layer.
引用
收藏
页码:1589 / 1601
页数:13
相关论文
共 50 条
  • [41] P2P file sharing for P2P computing
    Briquet, Cyril
    Dalem, Xavier
    Jodogne, Sebastien
    de Marneffe, Pierre-Arnoul
    MULTIAGENT AND GRID SYSTEMS, 2009, 5 (02) : 137 - 164
  • [42] A micro-payment architecture for P2P networks
    Zhang, Jie
    Zhao, Zheng
    Xiong, Xiao
    Shi, Qinwei
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2007, 2007, 6773
  • [43] Semantic routing of search queries in P2P networks
    Rostami, Habib
    Habibi, Afar
    Livani, Emad
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (12) : 1590 - 1602
  • [44] An Efficient Query Mechanism Base on P2P Networks
    Wang Xiaohua
    Mu Aiqin
    Zhao Defang
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [45] Investigating Cybercrimes that Occur on Documented P2P Networks
    Scanlon, Mark
    Hannaway, Alan
    Kechadi, Mohand-Tahar
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (02) : 56 - 63
  • [46] PERCEPTUAL TAGGING OF VIDEO FILES IN P2P NETWORKS
    Koz, Alper
    Lagendijk, R. L.
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 193 - 196
  • [47] Credibility Based Reputation Calculation in P2P Networks
    Prasad, R. V. V. S. V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2008, 5375 : 188 - +
  • [48] A Secure DHT Routing Scheme in P2P Networks
    Tan, Yunsong
    Zheng, Zujun
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 441 - +
  • [49] Locality-Awareness in BitTorrent-Like P2P Applications
    Liu, Bo
    Cui, Yi
    Lu, Yansheng
    Xue, Yuan
    IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (03) : 361 - 371
  • [50] Characterizing unstructured overlay topologies in modern P2P file-sharing systems
    Stutzbach, Daniel
    Rejaie, Reza
    Sen, Subhabrata
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (02) : 267 - 280