Saturday, July 16, 2016

P2P Overlay Architecture

Posted by Sarfraz Haider on 5:00 AM with No comments
P2P overlay network has a wide spectrum of communication frameworks in which peers build a self-organized system that is fully distributed and cooperative. Figure 1 depicts the abstract P2P overlay architecture showing different components of the overlay.

P2P Overlay Architecture


The Network Communication layer describes the network characteristics of an end system/node connected via internet, small wireless or sensor-based devices.
The Overlay Nodes Management layer plays its part as management of peers which includes discovery of peers and optimized routing algorithm.
The Features Management layer deals with security, reliability, fault tolerance, and robustness of P2P system.
The Service Specific layer is to provide support to Application layer to utilize the underlying resources in an efficient manner. It schedules the parallel and computation-intensive tasks, and performs task like file management and provides content. Here meta-data describes the information about content stored across the peers and their location information.
The Application level layer describes the actual functionality implemented over the underlying P2P overlay networks.

Structured P2P:

In structured overlay network the network assigns keys to data items and organizes its peers into a graph that maps each data key to a peer. Such structured P2P systems use the Distributed Hash Tables as a substructure where data objects either values or location information is placed.

Unstructured P2P:

In unstructured overlay networks the overlay network organize peers in a random graph in flat or hierarchical manner and uses flooding or random traversing or expanding Time-To-Live search on the graph to query content stored on overlay networks.

Distributed Hash Tables:

­­­­ Current widely-used P2P networks rely on central directory servers or massive message flooding, clearly not scalable solutions. Distributed Hash Tables (DHT) are expected to eliminate flooding and central servers, but can require many long-haul message deliveries.
Although many theoretical schemes for minimizing routing information have been proposed and many designs for DHTs have recently become prominent discussion topics, we are unaware of any practical and efficient system combining both.

Latest Research in P2P:

In order to get the latest that is happening in this area I decided to get some latest research papers online and went through them. According to my limited research that I did on this topic I found out that the over lay under lay mapping is very important in this domain of network models. The nodes that are that are connected logically should be close to each other physically as well in order to avoid network congestions and other delays.
Following is a brief summary of the latest research being carried out.

EGOIST Overlay Routing using Selfish Neighbor Selection

This paper discusses the issue of connectivity management, folding new arrivals into an existing overlay. Work has been done on this matter before dealing with devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. The authors of this paper have combined these two approaches and came up with a distributed overlay routing system called “Egoist”. Connectivity management is called upon when having to wire a newcomer into the existing mesh of nodes (bootstrapping), or when having to rewire the links be- tween overlay nodes to deal with churn and changing network conditions. Connectivity management is particularly challenging for overlay networks because over- lays often consist of nodes that are distributed across multiple administrative domains, in which auditing or enforcing global behavior can be difficult or impossible.
In a typical overlay network, a node must select a fixed number (k) of immediate overlay neighbors for routing traffic or queries for files. To solve this, the authors tried and tested the selfish neighbor selection technique which was different from traditional techniques. DHTs are able to provide the best possible indexing of objects in a network. On the other hand, routing of traffic on DHTs has been shown to be sub-optimal due to local forwarding [17, 24]. Egoist can be integrated as a different layer in DHTs; when an object is mapped onto a node, Egoist is responsible to optimally route the content. In Egoist, a newcomer overlay node vi connects to the system by querying a bootstrap node, from which it receives a list of potential overlay neighbors. The new- comer connects to at least one of these nodes, enabling it to participate in the link-state routing protocol running at the overlay layer. As a result, after some time, vi obtains the full residual graph G−i of the overlay. By running all-pairs shortest path algorithm on G−i, using Dijkstra’s algorithm, the newcomer is able to obtain the pair-wise distance (delay) function dG−i . In addition to this information, the newcomer estimates dij , the weight of a potential direct overlay link from it- self to node vj , for all vj V−i. Using the values of dij and dG−i , the newcomer connects to G−i using one of a number of wiring policies. Each node listens to all the control messages of the link state protocol and propagates them only to its immediate neighbors. In order to reduce system’s control traffic, each node propagates only unique messages by dropping messages that have been received more than once or have been superseded. In Egoist, a node selects its neighbor based on best response strategy. They also employed fast approximation versions based on local search instead of long arithmetic computation which will not only reduce computational cost but also enhance scalability. Egoist’s BR neighbor
selection strategy assumes that existing nodes never leave the overlay. Therefore, even in an extreme case in which some nodes are reachable through only a unique path, a node can count on this path always being in place. This can be a one set back of this technique. Egoist also deals with the cheating nodes (using the system to route one’s own traffic but denying routing to any incoming traffic from other nodes) very efficiently in which the nodes periodically select a random subset of remote nodes and “audit them” by querying the coordinate system for the delays of the outgoing links of the audited nodes and comparing them to the actual values that the audited nodes declare on the link-state routing protocol.
Delays are natural cost metrics for many applications, especially those involving interactive communication. To obtain the delay cost metric, a node needs to obtain estimates for its own delay to potential neighbors, and for the delay between pairs of overlay nodes already in the network. Using ping, one-way delay is estimated to be one half of the measured ping round-trip-times (RTT) averaged over enough samples. The performance of the system was measured on the basis of different cost metrics such as link and path delays, node load and available bandwidth. Results of the experiments are represented graphically which showed a positive outcome and the system out performed similar previous work done relating to this. They’ve also made it available for use for any third party application through their API. This way, both the application and its Egoist node run at the same node.
This was a very comprehensive paper about the work that authors of this paper carried out. All the basic working, idea behind it and the results were shown in detail explaining every aspect if the new system that they’ve designed. This work definitely have a lot of real world application as the one they’ve explained (Multiplayer P2P gaming) which makes it an extremely appealing and the best strong point of this paper.

Other Hot Areas:
·        
    Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment
    ·           Improving the Interaction between Overlay Routing and Traffic Engineering
    ·         ISP-Friendly Live P2P Streaming
    ·         Scalable Resilient Overlay Networks Using Destination-Guided Detouring

0 comments:

Post a Comment