skip to main content
10.1145/514191.514206acmconferencesArticle/Chapter ViewAbstractPublication PagesicsConference Proceedingsconference-collections
Article

Search and replication in unstructured peer-to-peer networks

Published:22 June 2002Publication History

ABSTRACT

Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network topology or data placement. However, the flooding-based query algorithm used in Gnutella does not scale; each query generates a large amount of traffic and large systems quickly become overwhelmed by the query-induced load. This paper explores, through simulation, various alternatives to Gnutella's query algorithm, data replication strategy, and network topology. We propose a query algorithm based on multiple random walks that resolves queries almost as quickly as Gnutella's flooding method while reducing the network traffic by two orders of magnitude in many cases. We also present simulation results on a distributed replication strategy proposed in [8]. Finally, we find that among the various network topologies we consider, uniform random graphs yield the best performance.

References

  1. L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman. Search in power law networks. In Phys. Rev. E64, pages 46135--46143, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  2. E. Adar and B. A. Huberman. Free riding on gnutella. In First Monday, http://www.firstmonday.dk/issues/ issue5_10/adar/index.html, Oct. 2000.Google ScholarGoogle Scholar
  3. W. Aiello, F. Chung, and L. Lu. A random graph model for massive graphs. In Proceedings of STOC'00, pages 171--180, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. V. Almeida, A. Bestavros, M. Crovella, and A. de Oliveira. Characterizing reference locality in the www. In Proceedings of 1996 International Conference on parallel and Distributed Information Systems (PDIS '96), Dec. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Calvert and E. W. Zegura. Gt-itm: Georgia tech internetwork topology models. In http://www.cc.gatech.edu/projects/gtitm/, 1997.Google ScholarGoogle Scholar
  6. Clip2.com. The gnutella protocol specification v0.4. In http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf, 2000.Google ScholarGoogle Scholar
  7. Clip2.com. Gnutella: To the bandwidth barrier and beyond. In http://www.clip2.com/gnutella.html, 2000.Google ScholarGoogle Scholar
  8. E. Cohen and S. Shenker. Replication strategies in unstructured peer-to-peer networks. In Proceedings of ACM SIGCOMM'02, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Free Haven website. http://www.freehaven.net.Google ScholarGoogle Scholar
  11. Freenet website. http://freenet.sourceforge.net.Google ScholarGoogle Scholar
  12. D. Gallagher and R. Wilkerson. Network performance statistics for university of south carolina. In http://eddie.csd.sc.edu, Oct. 2001.Google ScholarGoogle Scholar
  13. Gnutella website. http://gnutella.wego.com.Google ScholarGoogle Scholar
  14. M. A. Jovanovic, F. S. Annexstein, and K. A. Berman. Scalability issues in large peer-to-peer networks - a case study of gnutella. Technical Report http://www.ececs.uc.edu/~mjovanov/Research/paper.html, University of Cincinnati, 2001.Google ScholarGoogle Scholar
  15. Mojo Nation, 2001. http://www.mojonation.net.Google ScholarGoogle Scholar
  16. Napster website. http://www.napster.com.Google ScholarGoogle Scholar
  17. D. Plonka. Uw-madison napster traffic measurement. In http://net.doit.wisc.edu/data/Napster, Mar. 2000.Google ScholarGoogle Scholar
  18. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM'01, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Ritter. Why gnutella can't scale. no, really. In http://www.darkridge.com/~jpr5/doc/ gnutella.html, 2001.Google ScholarGoogle Scholar
  20. A. Rowstron and P. Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In Proceedings of SOSP'01, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. K. Sripanidkulchai. The popularity of gnutella queries and its implications on scalability. In O'Reilly's www.openp2p.com, Feb. 2001.Google ScholarGoogle Scholar
  22. S. D. G. Stefan~Saroiu, P. Krishna Gummadi. A measurement study of peer-to-peer file sharing systems. Technical Report UW-CSE-01-06-02, Department of Computer Science & Engineering, University of Washington, 2002.Google ScholarGoogle Scholar
  23. I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM'01, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. K. Truelove. Gnutella: Alive, well, and changing fast. In http://www.openp2p.com/pub/a/p2p/2001/01/25/ truelove0101.html, Jan. 2001.Google ScholarGoogle Scholar
  25. B. Yang and H. Garcia-Molina. Efficient search in peer-to-peer networks. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Y. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, University of California at Berkeley, Computer Science Department, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Search and replication in unstructured peer-to-peer networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICS '02: Proceedings of the 16th international conference on Supercomputing
            June 2002
            338 pages
            ISBN:1581134835
            DOI:10.1145/514191

            Copyright © 2002 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 June 2002

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            ICS '02 Paper Acceptance Rate31of144submissions,22%Overall Acceptance Rate584of2,055submissions,28%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader